메뉴 건너뛰기




Volumn 20, Issue 8, 2014, Pages 2481-2501

Security of the Internet of Things: perspectives and challenges

Author keywords

Heterogeneous; Internet of Things; RFID sensor networks; Security; Wireless sensor networks

Indexed keywords

NETWORK SECURITY; RADIO FREQUENCY IDENTIFICATION (RFID); WIRELESS SENSOR NETWORKS;

EID: 84910149653     PISSN: 10220038     EISSN: 15728196     Source Type: Journal    
DOI: 10.1007/s11276-014-0761-7     Document Type: Article
Times cited : (1039)

References (120)
  • 1
    • 84910136683 scopus 로고    scopus 로고
    • Future internet of things: Open issues and challenges
    • Tsai, C., Lai, C., & Vasilakos, V. (2014). Future internet of things: Open issues and challenges. ACM/Springer Wireless Networks,. doi:10.1007/s11276-014-0731-0.
    • (2014) ACM/Springer Wireless Networks
    • Tsai, C.1    Lai, C.2    Vasilakos, V.3
  • 7
    • 70249128685 scopus 로고    scopus 로고
    • Energy-aware security in M-Commerce and the internet of things
    • Hamad, F., Smalov, L., & James, A. (2009). Energy-aware security in M-Commerce and the internet of things. IETE TechmeM review,26(5), 357–362.
    • (2009) IETE TechmeM review , vol.26 , Issue.5 , pp. 357-362
    • Hamad, F.1    Smalov, L.2    James, A.3
  • 9
    • 60149097098 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
    • Mathur, S., Trappe, W., Mandayam, N., Ye, C., & Reznik, A. (2008) Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proceedings of MobiCom (pp. 128–139).
    • (2008) In Proceedings of MobiCom , pp. 128-139
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 15
    • 76649131520 scopus 로고    scopus 로고
    • Spatial–temporal relation-based energy-efficient reliable routing protocol in wireless sensor networks
    • Chen, M., Kwon, T., Mao, S., & Leung, V. (2009). Spatial–temporal relation-based energy-efficient reliable routing protocol in wireless sensor networks. International Journal of Sensor Networks,5(3), 129–141.
    • (2009) International Journal of Sensor Networks , vol.5 , Issue.3 , pp. 129-141
    • Chen, M.1    Kwon, T.2    Mao, S.3    Leung, V.4
  • 17
    • 84910123959 scopus 로고    scopus 로고
    • Ye, T., Peng, Q. M., & Ru, Z. H. (2012). IoT’s perception layer, network layer and application layer security analysis. Accessed 12 Oct 2013
    • Ye, T., Peng, Q. M., & Ru, Z. H. (2012). IoT’s perception layer, network layer and application layer security analysis.http://www.iot-online.com/jishuwenku/2012/1029/22888.html. Accessed 12 Oct 2013.
  • 18
    • 84910112698 scopus 로고    scopus 로고
    • Security analysis and security model research on IoT
    • Liu, B., Chen, H., Wang, H. T., & Fu, Y. (2012). Security analysis and security model research on IoT. Computer & Digital Engineering,40(11), 21–24.
    • (2012) Computer & Digital Engineering , vol.40 , Issue.11 , pp. 21-24
    • Liu, B.1    Chen, H.2    Wang, H.T.3    Fu, Y.4
  • 20
    • 84880050834 scopus 로고    scopus 로고
    • From machine-to-machine communications towards cyber-physical systems
    • Wan, J., Chen, M., Xia, F., Li, D., & Zhou, K. (2013). From machine-to-machine communications towards cyber-physical systems. Computer Science and Information Systems,10(3), 1105–1128.
    • (2013) Computer Science and Information Systems , vol.10 , Issue.3 , pp. 1105-1128
    • Wan, J.1    Chen, M.2    Xia, F.3    Li, D.4    Zhou, K.5
  • 22
    • 84910117088 scopus 로고    scopus 로고
    • Service-oriented middleware model for internet of things
    • Tan, Y. S., & Han, J. J. (2011). Service-oriented middleware model for internet of things. Computer Science,38(BIO), 3.
    • (2011) Computer Science , vol.38 , Issue.BIO , pp. 3
    • Tan, Y.S.1    Han, J.J.2
  • 23
    • 84910129794 scopus 로고    scopus 로고
    • Overview of ubiquitous networking and of its support in NGN
    • ITU-T. Recommendation Y
    • ITU-T. Recommendation Y. 2002. (2010). Overview of ubiquitous networking and of its support in NGN. Geneva: ITU.
    • (2010) Geneva: ITU
  • 24
    • 32844471136 scopus 로고    scopus 로고
    • An introduction to RFID technology
    • Want, R. (2006). An introduction to RFID technology. IEEE Pervasive Computing,5(1), 25–33.
    • (2006) IEEE Pervasive Computing , vol.5 , Issue.1 , pp. 25-33
    • Want, R.1
  • 26
    • 84885589116 scopus 로고    scopus 로고
    • Cloud-enabled wireless body area networks for pervasive healthcare
    • Wan, J., Zou, C., Ullah, S., Lai, C., Zhou, M., & Wang, X. (2013). Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Network,27(5), 56–61.
    • (2013) IEEE Network , vol.27 , Issue.5 , pp. 56-61
    • Wan, J.1    Zou, C.2    Ullah, S.3    Lai, C.4    Zhou, M.5    Wang, X.6
  • 27
    • 84910129180 scopus 로고    scopus 로고
    • EPC radio-frequency identity protocol Class-1 Generation-2 UHF RFID protocols for communications at 800 MHz-960 MHz, Ver. 1.0.9
    • EPC Global. (2004). EPC radio-frequency identity protocol Class-1 Generation-2 UHF RFID protocols for communications at 800 MHz-960 MHz, Ver. 1.0.9, EPC Global.
    • (2004) EPC Global
    • Global, E.P.C.1
  • 28
    • 84898828128 scopus 로고    scopus 로고
    • VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing
    • Wan, J., Zhang, D., Sun, Y., Lin, K., Zou, C., & Cai, H. (2014). VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing. ACM/Springer Mobile Networks and Applications,19(2), 153–160.
    • (2014) ACM/Springer Mobile Networks and Applications , vol.19 , Issue.2 , pp. 153-160
    • Wan, J.1    Zhang, D.2    Sun, Y.3    Lin, K.4    Zou, C.5    Cai, H.6
  • 34
    • 70349673740 scopus 로고    scopus 로고
    • An improved reader anti-collision algorithm based on pulse protocol with slot occupied probability in dense reader mode
    • Song, I. C., Hong, S. H., & Chang, K. H. (2009). An improved reader anti-collision algorithm based on pulse protocol with slot occupied probability in dense reader mode. In Proceeding of the IEEE 69th vehicular technology conference (pp. 1–5).
    • (2009) In Proceeding of the IEEE 69th vehicular technology conference , pp. 1-5
    • Song, I.C.1    Hong, S.H.2    Chang, K.H.3
  • 36
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Weis, S. A., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2004). Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing,2802, 201–212.
    • (2004) Security in Pervasive Computing , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 38
    • 77954775144 scopus 로고    scopus 로고
    • Code-centric RFID system based on software agent intelligence
    • Chen, M., Gonzalez, S., Zhang, Q., & Leung, V. (2010). Code-centric RFID system based on software agent intelligence. IEEE Intelligent Systems,25(2), 12–19.
    • (2010) IEEE Intelligent Systems , vol.25 , Issue.2 , pp. 12-19
    • Chen, M.1    Gonzalez, S.2    Zhang, Q.3    Leung, V.4
  • 39
    • 42149195728 scopus 로고    scopus 로고
    • Maintaining privacy in RFID enabled environments. Privacy, security and trust within the context of pervasive computing (pp
    • Berlin: Springer
    • Spiekermann, S., & Berthold, O. (2005). Maintaining privacy in RFID enabled environments. Privacy, security and trust within the context of pervasive computing (pp. 137–146). Berlin: Springer.
    • (2005) 137–146)
    • Spiekermann, S.1    Berthold, O.2
  • 45
    • 78651481337 scopus 로고    scopus 로고
    • The T2TIT—Thing to thing in the internet of things-project
    • T2TIT Research Group. (2006). The T2TIT—Thing to thing in the internet of things-project. ANR.
    • (2006) ANR
  • 46
    • 84910149275 scopus 로고    scopus 로고
    • T2TIT project. (May 2010). Accessed 12 Oct 2013
    • T2TIT project. (May 2010). http://www.infres.enst.fr/wp/blog/2009/11/20/t2titthings-to-things-in-the-internet-of-things-sesames-award-2009/. Accessed 12 Oct 2013.
  • 51
    • 84880538357 scopus 로고    scopus 로고
    • Algorithm design for data communications in duty-cycled wireless sensor networks: A survey
    • Han, K., Luo, J., Liu, Y., & Vasilakos, V. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine,51(7), 107–113.
    • (2013) IEEE Communications Magazine , vol.51 , Issue.7 , pp. 107-113
    • Han, K.1    Luo, J.2    Liu, Y.3    Vasilakos, V.4
  • 53
    • 84889567969 scopus 로고    scopus 로고
    • A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues
    • Li, M., Li, Z., & Vasilakos, V. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE,101(12), 2538–2557.
    • (2013) Proceedings of the IEEE , vol.101 , Issue.12 , pp. 2538-2557
    • Li, M.1    Li, Z.2    Vasilakos, V.3
  • 55
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: efficient security mechanisms for large-scale distributed sensor networks
    • Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceeding of ACM CCS (pp. 62–72).
    • (2003) In Proceeding of ACM CCS , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 56
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless Ad Hoc networks
    • Hu, Y. C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless Ad Hoc networks. Ad Hoc Networks,1(1), 175–192.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.C.1    Johnson, D.B.2    Perrig, A.3
  • 58
    • 25844530844 scopus 로고    scopus 로고
    • New constructions on broadcast encryption and key pre-distribution schemes
    • Huang, C. H., & Du, D. Z. (2005). New constructions on broadcast encryption and key pre-distribution schemes. IEEE INFOCOM,1, 515–523.
    • (2005) IEEE INFOCOM , vol.1 , pp. 515-523
    • Huang, C.H.1    Du, D.Z.2
  • 63
    • 57449101619 scopus 로고    scopus 로고
    • Taxonomy and challenges of the integration of RFID and wireless sensor networks
    • Liu, H., Bolic, M., Nayak, A., & Stojmenovic, I. (2008). Taxonomy and challenges of the integration of RFID and wireless sensor networks. IEEE Network,22(6), 26–35.
    • (2008) IEEE Network , vol.22 , Issue.6 , pp. 26-35
    • Liu, H.1    Bolic, M.2    Nayak, A.3    Stojmenovic, I.4
  • 64
    • 25844435733 scopus 로고    scopus 로고
    • (2005). PIKE: Peer intermediaries for key establishment in sensor networks
    • Chan, H. W., & Perrig, A. (2005). PIKE: Peer intermediaries for key establishment in sensor networks. In IEEE Infocom 2005 (vol. 1, pp. 524–535).
    • (2005) In IEEE Infocom , vol.1 , pp. 524-535
    • Chan, H.W.1    Perrig, A.2
  • 70
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: efficient security mechanisms for large-scale distributed sensor networks
    • Zhu, S. C., Setia, S., & Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceeding of ACM CCS (pp. 62–72).
    • (2003) In Proceeding of ACM CCS , pp. 62-72
    • Zhu, S.C.1    Setia, S.2    Jajodia, S.3
  • 75
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer,35(10), 54–62.
    • (2002) IEEE Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 78
    • 0003597249 scopus 로고    scopus 로고
    • Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University, Tech. Rep
    • Hu, Y. C., Perrig, A., & Johnson, D. B. (2002). Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University, Tech. Rep. TR01-384.
    • (2002) TR01-384
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 84
    • 84910136399 scopus 로고    scopus 로고
    • KSW microtec AG. KSW—TempSens. Accessed 12 Oct 2013
    • KSW microtec AG. KSW—TempSens.http://www.ksw-microtec.de/www/doc/overviewtempsens1124436343en.pdf. Accessed 12 Oct 2013.
  • 88
    • 34548344520 scopus 로고    scopus 로고
    • Phishing activity trends report
    • Anti-Phishing Working Group. (2009). Phishing activity trends report. Q42.
    • (2009) Q42
  • 91
    • 0037505358 scopus 로고    scopus 로고
    • DEAR: A device and energy aware routing protocol for heterogeneous Ad hoc networks
    • Avudainayagam, A., Lou, W., & Fang, Y. (2003). DEAR: A device and energy aware routing protocol for heterogeneous Ad hoc networks. Parallel and Distributed Computing,63(2), 228–236.
    • (2003) Parallel and Distributed Computing , vol.63 , Issue.2 , pp. 228-236
    • Avudainayagam, A.1    Lou, W.2    Fang, Y.3
  • 92
    • 0035245297 scopus 로고    scopus 로고
    • A new routing scheme concerning energy conservation in wireless home ad-hoc networks
    • Ryu, J. H., & Cho, D. H. (2001). A new routing scheme concerning energy conservation in wireless home ad-hoc networks. IEEE Transactions on Consumer Electronics,47(1), 1–5.
    • (2001) IEEE Transactions on Consumer Electronics , vol.47 , Issue.1 , pp. 1-5
    • Ryu, J.H.1    Cho, D.H.2
  • 96
    • 84910150610 scopus 로고    scopus 로고
    • Look the internet of things from the internet and 3G. Radio frequency (rf) in the world
    • Yang, Z. W. (2010). Look the internet of things from the internet and 3G. Radio frequency (rf) in the world, (01).
    • (2010) (01)
    • Yang, Z.W.1
  • 97
    • 84910134311 scopus 로고    scopus 로고
    • Based on analysis of internet security of 3G networks
    • Xiong, Z. (2012). Based on analysis of internet security of 3G networks. Digital Technology and Application,3, 231.
    • (2012) Digital Technology and Application , vol.3 , pp. 231
    • Xiong, Z.1
  • 98
    • 84910144199 scopus 로고    scopus 로고
    • Based on the 3G internet security mechanism research
    • Sun, C. M., Sun, Y. P., & Zhou, J. (2005). Based on the 3G internet security mechanism research. Computer knowledge and technology, 7(31), 7632–7635.
    • (2005) Computer knowledge and technology , vol.7 , Issue.31 , pp. 7632-7635
    • Sun, C.M.1    Sun, Y.P.2    Zhou, J.3
  • 99
    • 84910125264 scopus 로고    scopus 로고
    • Jin, R. (2010). Discussion of 6LowPan technology. Accessed 12 Oct 2013
    • Jin, R. (2010). Discussion of 6LowPan technology.http://blog.csdn.net/rizejin/article/details/5548520. Accessed 12 Oct 2013.
  • 100
    • 84910134805 scopus 로고    scopus 로고
    • Montenegro, G., Kushalnagar, N., Hui, J., & Culler, D. (2007). Transmission of IPv6 packets over IEEE 802.15.4 networks. Accessed 12 Oct 2013
    • Montenegro, G., Kushalnagar, N., Hui, J., & Culler, D. (2007). Transmission of IPv6 packets over IEEE 802.15.4 networks.http://tools.ietf.org/html/rfc4944. Accessed 12 Oct 2013.
  • 101
    • 84910140629 scopus 로고    scopus 로고
    • Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. Accessed 12 Oct 2013
    • Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals.http://tools.ietf.org/html/rfc4919. Accessed 12 Oct 2013.
  • 104
    • 84910123809 scopus 로고    scopus 로고
    • 6lowpan adaptation layer network self-organizing ability of the simulation and research
    • Gu, J
    • Gu, J. (2008). 6lowpan adaptation layer network self-organizing ability of the simulation and research. Computer Applications and Software, 20(10), 42–45.
    • (2008) Computer Applications and Software, 20(10), 42–45
  • 106
    • 79959280293 scopus 로고    scopus 로고
    • Internet of things: Applications and challenges in technology and standardization
    • Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49–69.
    • (2011) Wireless Personal Communications , vol.58 , Issue.1 , pp. 49-69
    • Bandyopadhyay, D.1    Sen, J.2
  • 109
    • 84910126742 scopus 로고    scopus 로고
    • Massive internet data security processing model research
    • Zhang, G. G., Bi, Y., & Li, C., et al. (2013). Massive internet data security processing model research. Small Microcomputer System, 34(9), 2090–2094.
    • (2013) Small Microcomputer System , vol.34 , Issue.9 , pp. 2090-2094
    • Zhang, G.G.1    Bi, Y.2    Li, C.3
  • 112
    • 84910144333 scopus 로고    scopus 로고
    • A. de Saint-Exupery. Internet of things [EB/OL]. Accessed 12 Oct 2013
    • A. de Saint-Exupery. Internet of things [EB/OL]. http://www.sintef.no/upload/IKT/9022/CERP-IoT%20SRA_IoT_vll_pdf.pf. Accessed 12 Oct 2013.
  • 113
    • 34248219805 scopus 로고    scopus 로고
    • Research on China internet of things’ services and management
    • Sheng, N. H., Yu, Z., Li, L. F., Ming, L. W., & Feng, Q. S. (2006). Research on China internet of things’ services and management. Chinese of Journal Electronics,34(12A), 2514–2517.
    • (2006) Chinese of Journal Electronics , vol.34 , Issue.12A , pp. 2514-2517
    • Sheng, N.H.1    Yu, Z.2    Li, L.F.3    Ming, L.W.4    Feng, Q.S.5
  • 115
  • 116
    • 84875896783 scopus 로고    scopus 로고
    • Beijing University of Aeronautics and Astronautics Press, Beijing:
    • Zai, L., Liu, S. D., & Hu, X. B. (2007). ZigBee technology and application (p. 2007). Beijing: Beijing University of Aeronautics and Astronautics Press.
    • (2007) ZigBee technology and application , pp. 2007
    • Zai, L.1    Liu, S.D.2    Hu, X.B.3
  • 119
    • 84910114990 scopus 로고    scopus 로고
    • The internet of things technology in the application of the smart home
    • Chen, Y. P. (2013). The internet of things technology in the application of the smart home. China Public Security,16, 61–63.
    • (2013) China Public Security , vol.16 , pp. 61-63
    • Chen, Y.P.1
  • 120
    • 84910131940 scopus 로고    scopus 로고
    • The smart home system based on internet of things technology research and discussion
    • Bao, Y. Q. (2013). The smart home system based on internet of things technology research and discussion. The Internet of Things Technology,7, 38–41.
    • (2013) The Internet of Things Technology , vol.7 , pp. 38-41
    • Bao, Y.Q.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.