메뉴 건너뛰기




Volumn , Issue , 2014, Pages 122-127

RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects

Author keywords

IoT; Privacy; Security; Smart City; Trust

Indexed keywords

AGRICULTURAL ROBOTS; DATA PRIVACY; NETWORK ARCHITECTURE; NETWORK PROTOCOLS; SMART CITY;

EID: 84912047576     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNCW.2014.6934872     Document Type: Conference Paper
Times cited : (87)

References (40)
  • 1
    • 84880745230 scopus 로고    scopus 로고
    • A lightweight framework for secure life-logging in smart environments
    • N. Petroulakis, et al., "A lightweight framework for secure life-logging in smart environments," Information Security Technical Report, 2012.
    • (2012) Information Security Technical Report
    • Petroulakis, N.1
  • 2
    • 84880712339 scopus 로고    scopus 로고
    • Secure and energy-efficient life-logging in wireless pervasive environments
    • Privacy, and Trust. Springer
    • A. Fragkiadakis, et al., "Secure and energy-efficient life-logging in wireless pervasive environments," in Human Aspects of Information Security, Privacy, and Trust. Springer, 2013, pp. 306-315.
    • (2013) Human Aspects of Information Security , pp. 306-315
    • Fragkiadakis, A.1
  • 3
    • 84881318163 scopus 로고    scopus 로고
    • Spectrum assignment in cognitive radio networks: A comprehensive survey
    • E. Tragos, et al., "Spectrum assignment in cognitive radio networks: A comprehensive survey," IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 1108-1135, 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.3 , pp. 1108-1135
    • Tragos, E.1
  • 4
    • 84872871627 scopus 로고    scopus 로고
    • Security in cognitive wireless sensor networks. Challenges and open problems
    • A. Araujo et al., "Security in cognitive wireless sensor networks. challenges and open problems," Journal on Wireless Communications and Networking, vol. 48, 2012.
    • (2012) Journal on Wireless Communications and Networking , vol.48
    • Araujo, A.1
  • 5
    • 84873711287 scopus 로고    scopus 로고
    • A survey on security threats and detection techniques in cognitive radio networks
    • A. Fragkiadakis, E. Tragos, and I. Askoxylakis, "A survey on security threats and detection techniques in cognitive radio networks," IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 428-445, 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.3 , pp. 428-445
    • Fragkiadakis, A.1    Tragos, E.2    Askoxylakis, I.3
  • 6
    • 84875051385 scopus 로고    scopus 로고
    • A highly scalable key pre-distribution scheme for wireless sensor networks
    • W. Bechkit, et al, "A highly scalable key pre-distribution scheme for wireless sensor networks," Wireless Communications, IEEE Transactions on, vol. 12, no. 2, pp. 948-959, 2013.
    • (2013) Wireless Communications, IEEE Transactions on , vol.12 , Issue.2 , pp. 948-959
    • Bechkit, W.1
  • 7
    • 79955712919 scopus 로고    scopus 로고
    • Key management systems for sensor networks in the context of the Internet of Things
    • Mar.
    • R. Roman, et al., "Key management systems for sensor networks in the context of the Internet of Things," Computers & Electrical Engineering, vol. 37, no. 2, pp. 147-159, Mar. 2011.
    • (2011) Computers & Electrical Engineering , vol.37 , Issue.2 , pp. 147-159
    • Roman, R.1
  • 8
    • 84884404306 scopus 로고    scopus 로고
    • Cryptographic key exchange in ipv6-based low power, lossy networks
    • ser. Lecture Notes in Computer Science. Springer, May
    • P. Ilia, G. Oikonomou, and T. Tryfonas, "Cryptographic key exchange in ipv6-based low power, lossy networks," in Proc. of WISTP '13), ser. Lecture Notes in Computer Science. Springer, May 2013, pp. 34-49.
    • (2013) Proc. of WISTP '13) , pp. 34-49
    • Ilia, P.1    Oikonomou, G.2    Tryfonas, T.3
  • 9
    • 4444219556 scopus 로고    scopus 로고
    • "802.15.4-2006: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for Low Rate Wireless Personal Area Networks (LR-WPANs)," IEEE Standard, 2011.
    • (2011) IEEE Standard
  • 10
    • 80052447165 scopus 로고    scopus 로고
    • Securing Communication in 6LoWPAN with Compressed IPsec
    • Jun.
    • S. Raza, et al., "Securing Communication in 6LoWPAN with Compressed IPsec," in Proc. 7th IEEE DCOSS '11), Jun. 2011.
    • (2011) Proc. 7th IEEE DCOSS '11)
    • Raza, S.1
  • 11
    • 79959516675 scopus 로고    scopus 로고
    • Public-key based access control in sensornet
    • H. Wang, et al., "Public-key based access control in sensornet," Wireless Networks, vol. 17, no. 5, pp. 1217-1234, 2011.
    • (2011) Wireless Networks , vol.17 , Issue.5 , pp. 1217-1234
    • Wang, H.1
  • 12
    • 84871369628 scopus 로고    scopus 로고
    • Adapting TLS handshake protocol for heterogenous IP-based WSN using identity based cryptography
    • R. Mzid, et al, "Adapting TLS handshake protocol for heterogenous IP-based WSN using identity based cryptography," in Int. Conf. on ICWUS '10), 2010, pp. 1-8.
    • (2010) Int. Conf. on ICWUS '10) , pp. 1-8
    • Mzid, R.1
  • 13
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decis. Support Syst., vol. 43, no. 2, pp. 618-644, 2007.
    • (2007) Decis. Support Syst. , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 14
    • 84871767830 scopus 로고    scopus 로고
    • Towards a theory of trust in networks of humans and computers
    • ser. LNCS. Springer Verlag
    • V. Gligor and J. M. Wing, "Towards a theory of trust in networks of humans and computers," in 19th Int. Workshop on Security Protocols, ser. LNCS. Springer Verlag, 2011.
    • (2011) 19th Int. Workshop on Security Protocols
    • Gligor, V.1    Wing, J.M.2
  • 15
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • A. Perrig, et al., "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1
  • 16
    • 33745801618 scopus 로고    scopus 로고
    • Securing XML data in thirdparty distribution systems
    • B. Carminati, E. Ferrari, and E. Bertino, "Securing XML data in thirdparty distribution systems," in ACM CIKM, 2005, pp. 99-106.
    • (2005) ACM CIKM , pp. 99-106
    • Carminati, B.1    Ferrari, E.2    Bertino, E.3
  • 17
    • 27944454864 scopus 로고    scopus 로고
    • Location privacy in mobile systems: A personalized anonymization model
    • B. Gedik and L. Liu, "Location privacy in mobile systems: A personalized anonymization model," in Proc. of 25th IEEE ICDCS '05. IEEE, 2005, pp. 620-629.
    • (2005) Proc. of 25th IEEE ICDCS '05. IEEE , pp. 620-629
    • Gedik, B.1    Liu, L.2
  • 18
    • 33646059204 scopus 로고    scopus 로고
    • Sanitizable signatures
    • Springer
    • G. Ateniese et al., "Sanitizable signatures," in Proc. of 10th ESORICS '05. Springer, 2005, pp. 159-177.
    • (2005) Proc. of 10th ESORICS '05 , pp. 159-177
    • Ateniese, G.1
  • 19
    • 23044534452 scopus 로고    scopus 로고
    • Content extraction signatures
    • Springer
    • R. Steinfeld, L. Bull, and Y. Zheng, "Content extraction signatures," in Proc. of 4th ICISC '01, vol. 2288. Springer, 2002, pp. 163-205.
    • (2002) Proc. of 4th ICISC '01 , vol.2288 , pp. 163-205
    • Steinfeld, R.1    Bull, L.2    Zheng, Y.3
  • 20
    • 84912025051 scopus 로고
    • ISO/IEC Standard
    • "7498-2: Information processing systems-Open Systems Interconnection-Basic Reference Model-Part 2: Security Architecture," ISO/IEC Standard, 1989.
    • (1989)
  • 21
    • 84863496164 scopus 로고    scopus 로고
    • Veracity, plausibility, and reputation
    • Berlin, Heidelberg: Springer-Verlag
    • D. Gollmann, "Veracity, plausibility, and reputation," in Proc. of WISTP'12. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 20-28.
    • (2012) Proc. of WISTP'12 , pp. 20-28
    • Gollmann, D.1
  • 23
    • 84861997111 scopus 로고    scopus 로고
    • Survey paper internet of things: Vision, applications and research challenges
    • Elsevier
    • D. Miorandi, et al., "Survey paper internet of things: Vision, applications and research challenges," in Ad Hoc Networks, vol. 10. Elsevier, 2012.
    • (2012) Ad Hoc Networks , vol.10
    • Miorandi, D.1
  • 25
    • 47249114835 scopus 로고    scopus 로고
    • SEDAN: Secure and efficient protocol for data aggregation in wireless sensor networks
    • M. Bagaa et al., "SEDAN: secure and efficient protocol for data aggregation in wireless sensor networks," in Proc. of IEEE LCN. IEEE, 2007, pp. 1053-1060.
    • (2007) Proc. of IEEE LCN. IEEE , pp. 1053-1060
    • Bagaa, M.1
  • 28
    • 42549159545 scopus 로고    scopus 로고
    • Public key based cryptoschemes for data concealment in wireless sensor networks
    • September
    • E. Mykletun, J. Girao, and D. Westhoff, "Public key based cryptoschemes for data concealment in wireless sensor networks," in Proc. of IEEE ICC'06. IEEE, September 2006, pp. 2288-2295.
    • (2006) Proc. of IEEE ICC'06. IEEE , pp. 2288-2295
    • Mykletun, E.1    Girao, J.2    Westhoff, D.3
  • 29
    • 84876943063 scopus 로고    scopus 로고
    • Internet of things (iot): A vision, architectural elements, and future directions
    • Elsevier, September
    • J. Gubbi, et al., "Internet of Things (IoT): A vision, architectural elements, and future directions," in Future Generation Computer Systems, vol. 29. Elsevier, September 2013, pp. 1645-1660.
    • (2013) Future Generation Computer Systems , vol.29 , pp. 1645-1660
    • Gubbi, J.1
  • 30
    • 79952637538 scopus 로고    scopus 로고
    • Adjacent channel interference in 802.11a is harmful: Testbed validation of a simple quantification model
    • V. Angelakis et al., "Adjacent channel interference in 802.11a is harmful: Testbed validation of a simple quantification model," IEEE Commun. Mag., vol. 49, no. 3, pp. 160-166, 2011.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.3 , pp. 160-166
    • Angelakis, V.1
  • 31
    • 84949499258 scopus 로고    scopus 로고
    • Cognitive radio inspired m2m communications (invited paper)
    • Jun.
    • E. Tragos and V. Angelakis, "Cognitive Radio Inspired M2M Communications (Invited Paper)," in Proc. IEEE GWS 2013, Jun. 2013.
    • (2013) Proc. IEEE GWS 2013
    • Tragos, E.1    Angelakis, V.2
  • 34
    • 67049155506 scopus 로고    scopus 로고
    • Security of sanitizable signatures revisited
    • Berlin, Heidelberg: Springer-Verlag
    • C. Brzuska, et al., "Security of sanitizable signatures revisited," in Proc. PKC 2009. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 317-336.
    • (2009) Proc. PKC 2009 , pp. 317-336
    • Brzuska, C.1
  • 35
    • 84912041069 scopus 로고    scopus 로고
    • Efficient and perfectly unlinkable sanitizable signatures without group signatures
    • ser. LNCS. Springer
    • C. Brzuska, H. C. Pohls, and K. Samelin, "Efficient and perfectly unlinkable sanitizable signatures without group signatures," in Proc. of EuroPKI 2013, ser. LNCS. Springer, 2013.
    • (2013) Proc. of EuroPKI 2013
    • Brzuska, C.1    Pohls, H.C.2    Samelin, K.3
  • 36
    • 84912008687 scopus 로고    scopus 로고
    • Design considerations for a cognitive radio trust and security framework
    • A. Mihovska et al., "Design considerations for a cognitive radio trust and security framework," in IEEE CAMAD 2012, 2012.
    • (2012) IEEE CAMAD 2012
    • Mihovska, A.1
  • 38
    • 84871266331 scopus 로고    scopus 로고
    • RPL: IPv6 routing protocol for low power and lossy networks
    • Mar.
    • T. Winter, et al., "RPL: IPv6 Routing Protocol for Low power and Lossy Networks," RFC 6550, Mar. 2012.
    • (2012) RFC , vol.6550
    • Winter, T.1
  • 39
    • 78650911380 scopus 로고    scopus 로고
    • Constrained application protocol (CoAP)
    • Jun. , (draft-ietf-core-coap-18).
    • Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol (CoAP)," Internet Draft, Jun. 2013, (draft-ietf-core-coap-18).
    • (2013) Internet Draft
    • Shelby, Z.1    Hartke, K.2    Bormann, C.3
  • 40
    • 84901332371 scopus 로고    scopus 로고
    • Enabling reliable and secure iot-based smart city applications
    • to be published
    • E. Tragos, et al., "Enabling Reliable and Secure IoT-based Smart City Applications," in IEEE PerCity' 14, 2014, to be published.
    • (2014) IEEE PerCity' 14
    • Tragos, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.