메뉴 건너뛰기




Volumn 76, Issue , 2015, Pages 146-164

Security, privacy and trust in Internet of things: The road ahead

Author keywords

Internet of Things; Privacy; Security; Trust

Indexed keywords

ACCESS CONTROL; DATA PRIVACY; TRUSTED COMPUTING;

EID: 84919372488     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2014.11.008     Document Type: Short Survey
Times cited : (1602)

References (146)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito The internet of things: a survey Comput. Netw. 54 15 2010 2787 2805
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 2
    • 84861997111 scopus 로고    scopus 로고
    • Survey internet of things: Vision, applications and research challenges
    • D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac Survey internet of things: vision, applications and research challenges Ad Hoc Netw. 10 7 2012 1497 1516
    • (2012) Ad Hoc Netw. , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 4
    • 79960590167 scopus 로고    scopus 로고
    • M2M: The internet of 50 billion devices
    • B. Emmerson M2M: the internet of 50 billion devices Huawei Win-Win Mag. J. 4 2010 19 22
    • (2010) Huawei Win-Win Mag. J. , Issue.4 , pp. 19-22
    • Emmerson, B.1
  • 5
    • 84891569276 scopus 로고    scopus 로고
    • D. Boswarthick, O. Elloumi, and O. Hersent M2M Communications: A Systems Approach first ed. 2012 Wiley Publishing
  • 6
    • 84891583935 scopus 로고    scopus 로고
    • O. Hersent, D. Boswarthick, and O. Elloumi The Internet of Things: Key Applications and Protocols second ed. 2012 Wiley Publishing
  • 7
    • 84901294182 scopus 로고    scopus 로고
    • L.A. Grieco, M.B. Alaya, T. Monteil, K.K. Drira, Architecting information centric ETSI-M2M systems, in: IEEE PerCom, 2014.
  • 8
    • 74949143896 scopus 로고    scopus 로고
    • Internet of things - New security and privacy challenges
    • R.H. Weber Internet of things - new security and privacy challenges Comput. Law Secur. Rev. 26 1 2010 23 30
    • (2010) Comput. Law Secur. Rev. , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 10
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • R. Roman, J. Zhou, and J. Lopez On the features and challenges of security and privacy in distributed internet of things Comput. Networks 57 10 2013 2266 2279
    • (2013) Comput. Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 11
    • 85033691168 scopus 로고    scopus 로고
    • J. Anderson, L. Rainie, The Internet of Things will Thrive by 2025, PewResearch Internet Project, May 2014. < http://www.pewinternet.org/2014/05/14/internet-of-things/ >.
  • 12
    • 79960321206 scopus 로고    scopus 로고
    • A survey of middleware for internet of things
    • WiMo 2011 and CoNeCo 2011, Ankara, Turkey
    • S. Bandyopadhyay, M. Sengupta, S. Maiti, S. Dutta, A survey of middleware for internet of things, in: Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey, 2011, pp. 288-296.
    • (2011) Third International Conferences , pp. 288-296
    • Bandyopadhyay, S.1    Sengupta, M.2    Maiti, S.3    Dutta, S.4
  • 15
    • 84867536674 scopus 로고    scopus 로고
    • An overview of the internet of underwater things
    • M.C. Domingo An overview of the internet of underwater things J. Network Comput. Appl. 35 6 2012 1879 1890
    • (2012) J. Network Comput. Appl. , vol.35 , Issue.6 , pp. 1879-1890
    • Domingo, M.C.1
  • 16
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami Internet of Things (IoT): a vision, architectural elements, and future directions Future Gener. Comput. Syst. 29 7 2013 1645 1660
    • (2013) Future Gener. Comput. Syst. , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 17
    • 84901427258 scopus 로고    scopus 로고
    • A survey on trust management for internet of things
    • Z. Yan, P. Zhang, and A.V. Vasilakos A survey on trust management for internet of things J. Network Comput. Appl. 42 0 2014 120 134
    • (2014) J. Network Comput. Appl. , vol.42 , pp. 120-134
    • Yan, Z.1    Zhang, P.2    Vasilakos, A.V.3
  • 19
    • 84885304488 scopus 로고    scopus 로고
    • Dtls based security and two-way authentication for the internet of things
    • T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle Dtls based security and two-way authentication for the internet of things Ad Hoc Netw. 11 8 2013 2710 2723
    • (2013) Ad Hoc Netw. , vol.11 , Issue.8 , pp. 2710-2723
    • Kothmayr, T.1    Schmitt, C.2    Hu, W.3    Brunig, M.4    Carle, G.5
  • 20
    • 79955712919 scopus 로고    scopus 로고
    • Key management systems for sensor networks in the context of the internet of things
    • R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos Key management systems for sensor networks in the context of the internet of things Comput. Electrical Eng. 37 2 2011 147 159
    • (2011) Comput. Electrical Eng. , vol.37 , Issue.2 , pp. 147-159
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3    Sklavos, N.4
  • 24
    • 84875786680 scopus 로고    scopus 로고
    • A security framework for the internet of things based on public key infrastructure
    • H. Ning A security framework for the internet of things based on public key infrastructure Adv. Mater. Res. 671-674 2013 3223 3226
    • (2013) Adv. Mater. Res. , vol.671-674 , pp. 3223-3226
    • Ning, H.1
  • 25
    • 80052689804 scopus 로고    scopus 로고
    • A security transmission model for internet of things
    • Z.-Q. Wu, Y.-W. Zhou, and J.-F. Ma A security transmission model for internet of things Jisuanji Xuebao/Chin. J. Comput. 34 8 2011 1351 1364
    • (2011) Jisuanji Xuebao/Chin. J. Comput. , vol.34 , Issue.8 , pp. 1351-1364
    • Wu, Z.-Q.1    Zhou, Y.-W.2    Ma, J.-F.3
  • 28
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • H. Chan, and A. Perrig Security and privacy in sensor networks IEEE Commun. Mag. 36 10 2003 103 105
    • (2003) IEEE Commun. Mag. , vol.36 , Issue.10 , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 29
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • J. Yick, B. Mukherjee, and D. Ghosal Wireless sensor network survey Comput. Netw. 52 12 2008 2292 2330
    • (2008) Comput. Netw. , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 30
    • 67650461985 scopus 로고    scopus 로고
    • Privacy preservation in wireless sensor networks: A state-of-the-art survey
    • N. Li, N. Zhang, S.K. Das, and B. Thuraisingham Privacy preservation in wireless sensor networks: a state-of-the-art survey Ad Hoc Netw. 7 8 2009 1501 1514
    • (2009) Ad Hoc Netw. , vol.7 , Issue.8 , pp. 1501-1514
    • Li, N.1    Zhang, N.2    Das, S.K.3    Thuraisingham, B.4
  • 31
    • 75149127612 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • J. Zhang, and V. Varadharajan Security and privacy in sensor networks J. Network Comput. Appl. 33 2 2010 63 75
    • (2010) J. Network Comput. Appl. , vol.33 , Issue.2 , pp. 63-75
    • Zhang, J.1    Varadharajan, V.2
  • 34
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
    • M. Turkanovi, B. Brumen, and M. Hlbl A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion Ad Hoc Netw. 20 2014 96 112
    • (2014) Ad Hoc Netw. , vol.20 , pp. 96-112
    • Turkanovi, M.1    Brumen, B.2    Hlbl, M.3
  • 35
    • 84894059526 scopus 로고    scopus 로고
    • An efficient authentication and access control scheme for perception layer of internet of things
    • N. Ye, Y. Zhu, R.-C. b. Wang, R. Malekian, and Q.-M. Lin An efficient authentication and access control scheme for perception layer of internet of things Appl. Math. Inf. Sci. 8 4 2014 1617 1624
    • (2014) Appl. Math. Inf. Sci. , vol.8 , Issue.4 , pp. 1617-1624
    • Ye, N.1    Zhu, Y.2    Wang, R.-C.B.3    Malekian, R.4    Lin, Q.-M.5
  • 36
    • 84879815746 scopus 로고    scopus 로고
    • Anonymous authentication for privacy-preserving iot target-driven applications
    • A. Alcaide, E. Palomar, J. Montero-Castillo, and A. Ribagorda Anonymous authentication for privacy-preserving iot target-driven applications Comput. Secur. 37 2013 111 123
    • (2013) Comput. Secur. , vol.37 , pp. 111-123
    • Alcaide, A.1    Palomar, E.2    Montero-Castillo, J.3    Ribagorda, A.4
  • 39
    • 85033713974 scopus 로고    scopus 로고
    • M. Ali, M. ElTabakh, C. Nita-Rotaru, FT-RC4: A Robust Security Mechanism for Data Stream Systems, Tech. Rep. TR-05-024, Purdue University (November 2005).
  • 42
    • 77951939042 scopus 로고    scopus 로고
    • Continuous authentication on relational data streams
    • S. Papadopoulos, Y. Yang, and D. Papadias Continuous authentication on relational data streams VLDB J. 19 1 2010 161 180
    • (2010) VLDB J. , vol.19 , Issue.1 , pp. 161-180
    • Papadopoulos, S.1    Yang, Y.2    Papadias, D.3
  • 48
  • 54
    • 84880621938 scopus 로고    scopus 로고
    • A capability-based security approach to manage access control in the internet of things
    • S. Gusmeroli, S. Piccionea, and D. Rotondi A capability-based security approach to manage access control in the internet of things Math. Comput. Model. 58 5-6 2013 1189 1205
    • (2013) Math. Comput. Model. , vol.58 , Issue.56 , pp. 1189-1205
    • Gusmeroli, S.1    Piccionea, S.2    Rotondi, D.3
  • 55
    • 85033720227 scopus 로고    scopus 로고
    • European FP7 IoT@Work project. < http://iot-at-work.eu >.
  • 56
    • 77957581415 scopus 로고    scopus 로고
    • Identity management framework towards internet of things (IoT): Roadmap and key challenges
    • P. Mahalle, S. Babar, N. Prasad, and R. Prasad Identity management framework towards internet of things (IoT): Roadmap and key challenges Commun. Comput. Inf. Sci. 89 2010 430 439
    • (2010) Commun. Comput. Inf. Sci. , vol.89 , pp. 430-439
    • Mahalle, P.1    Babar, S.2    Prasad, N.3    Prasad, R.4
  • 58
    • 84885311585 scopus 로고    scopus 로고
    • A novel batch-based group key management protocol applied to the internet of things
    • L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari A novel batch-based group key management protocol applied to the internet of things Ad Hoc Netw. 11 8 2013 2724 2737
    • (2013) Ad Hoc Netw. , vol.11 , Issue.8 , pp. 2724-2737
    • Veltri, L.1    Cirani, S.2    Busanelli, S.3    Ferrari, G.4
  • 63
    • 84860302129 scopus 로고    scopus 로고
    • Security model and key technologies for the internet of things
    • J. Yang, and B. Fang Security model and key technologies for the internet of things J. China Universities Posts Telecommun. 8 2 2011 109 112
    • (2011) J. China Universities Posts Telecommun. , vol.8 , Issue.2 , pp. 109-112
    • Yang, J.1    Fang, B.2
  • 65
    • 84906994292 scopus 로고    scopus 로고
    • Performance evaluation of attribute-based encryption: Toward data privacy in the IoT
    • ICC 2014, Sydney, NSW
    • X. Wang, J. Zhang, E. Schooler, M. Ion, Performance evaluation of attribute-based encryption: Toward data privacy in the IoT, in: 2014 IEEE International Conference on Communications, ICC 2014, Sydney, NSW, 2014, pp. 725-730.
    • (2014) 2014 IEEE International Conference on Communications , pp. 725-730
    • Wang, X.1    Zhang, J.2    Schooler, E.3    Ion, M.4
  • 66
    • 84892977444 scopus 로고    scopus 로고
    • EPASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things
    • J. Su, D. Cao, B. Zhao, X. Wang, and I. You ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things Future Gener. Comput. Syst. 33 0 2014 11 18
    • (2014) Future Gener. Comput. Syst. , vol.33 , pp. 11-18
    • Su, J.1    Cao, D.2    Zhao, B.3    Wang, X.4    You, I.5
  • 67
    • 84904685807 scopus 로고    scopus 로고
    • Privacy protection based on key-changed mutual authentication protocol in internet of things
    • L.b. Peng, W.b. Ru-chuan, S. Xiao-yu, and C. Long Privacy protection based on key-changed mutual authentication protocol in internet of things Commun. Comput. Inf. Sci. 418 CCIS 2014 345 355
    • (2014) Commun. Comput. Inf. Sci. , vol.418 CCIS , pp. 345-355
    • Peng, L.B.1    Ru-Chuan, W.B.2    Xiao-Yu, S.3    Long, C.4
  • 68
    • 84904480169 scopus 로고    scopus 로고
    • Iot-privacy: To be private or not to be private
    • Toronto, ON
    • A. Ukil, S. Bandyopadhyay, A. Pal, Iot-privacy: To be private or not to be private, in: Proceedings - IEEE INFOCOM, Toronto, ON, 2014, pp. 123-124.
    • (2014) Proceedings - IEEE INFOCOM , pp. 123-124
    • Ukil, A.1    Bandyopadhyay, S.2    Pal, A.3
  • 71
    • 84866382206 scopus 로고    scopus 로고
    • Trust management for the internet of things and its application to service composition
    • WoWMoM 2012, San Francisco, CA, United States
    • F. Bao, I. Chen, Trust management for the internet of things and its application to service composition, in: 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, United States, 2012, pp. 1-6.
    • (2012) 13th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks , pp. 1-6
    • Bao, F.1    Chen, I.2
  • 73
    • 84880467894 scopus 로고    scopus 로고
    • The eigen-trust algorithm for reputation management in p2p networks
    • New York, USA
    • S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigen-trust algorithm for reputation management in p2p networks, in: Proc. WWW'03, New York, USA, 2003, pp. 640-651.
    • (2003) Proc. WWW'03 , pp. 640-651
    • Kamvar, S.D.1    Schlosser, M.T.2    Garcia-Molina, H.3
  • 74
    • 3142738238 scopus 로고    scopus 로고
    • Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
    • L. Xiong, and L. Liu Peertrust: supporting reputation-based trust for peer-to-peer electronic communities IEEE Trans. Knowl. Data Eng. 16 2004 843 857
    • (2004) IEEE Trans. Knowl. Data Eng. , vol.16 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 75
    • 4544372572 scopus 로고    scopus 로고
    • A reputation-based trust management system for p2p networks
    • Washington, DC, USA
    • A.A. Selcuk, E. Uzun, M.R. Pariente, A reputation-based trust management system for p2p networks, in: Proc. of CCGRID 2004, Washington, DC, USA, 2004, pp. 251-258.
    • (2004) Proc. of CCGRID 2004 , pp. 251-258
    • Selcuk, A.A.1    Uzun, E.2    Pariente, M.R.3
  • 77
    • 29844451556 scopus 로고    scopus 로고
    • Enforcing cooperative resource sharing in untrusted p2p computing environments
    • Z. Liang, and W. Shi Enforcing cooperative resource sharing in untrusted p2p computing environments Mob. Netw. Appl. 10 2005 251 258
    • (2005) Mob. Netw. Appl. , vol.10 , pp. 251-258
    • Liang, Z.1    Shi, W.2
  • 80
    • 84883144500 scopus 로고    scopus 로고
    • Distributed trust management mechanism for the internet of things
    • J. Wang, S. Bin, Y. Yu, and X. Niu Distributed trust management mechanism for the internet of things Appl. Mech. Mater. 347-350 4 2013 2463 2467
    • (2013) Appl. Mech. Mater. , vol.347-350 , Issue.4 , pp. 2463-2467
    • Wang, J.1    Bin, S.2    Yu, Y.3    Niu, X.4
  • 81
    • 84865649356 scopus 로고    scopus 로고
    • An integrated scheme based on service classification in pervasive mobile services
    • Y. Liu, Z. Chen, F. Xia, X. Lv, and F. Bu An integrated scheme based on service classification in pervasive mobile services Int. J. Commun. Syst. 25 9 2012 1178 1188
    • (2012) Int. J. Commun. Syst. , vol.25 , Issue.9 , pp. 1178-1188
    • Liu, Y.1    Chen, Z.2    Xia, F.3    Lv, X.4    Bu, F.5
  • 84
    • 84888861197 scopus 로고    scopus 로고
    • Trust management system design for the internet of things: A context-aware and multi-service approach
    • Y. Saied, A. Olivereau, D. Zeghlache, and M. Laurent Trust management system design for the internet of things: a context-aware and multi-service approach Comput. Secur. 39 2013 351 365
    • (2013) Comput. Secur. , vol.39 , pp. 351-365
    • Saied, Y.1    Olivereau, A.2    Zeghlache, D.3    Laurent, M.4
  • 85
    • 84866163989 scopus 로고    scopus 로고
    • Attack-resistant trust management model based on beta function for distributed routing in internet of things
    • P. Dong, J. Guan, X. Xue, and H. Wang Attack-resistant trust management model based on beta function for distributed routing in internet of things China Commun. 9 4 2012 89 98
    • (2012) China Commun. , vol.9 , Issue.4 , pp. 89-98
    • Dong, P.1    Guan, J.2    Xue, X.3    Wang, H.4
  • 87
    • 84879230262 scopus 로고    scopus 로고
    • Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the future internet
    • P. Martinez-Julia, and A.F. Skarmeta Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet Comput. Netw. 57 10 2013 2280 2300
    • (2013) Comput. Netw. , vol.57 , Issue.10 , pp. 2280-2300
    • Martinez-Julia, P.1    Skarmeta, A.F.2
  • 88
    • 85033709378 scopus 로고    scopus 로고
    • G.D. Tormo, F.G. Marmol, G.M. Perez, Dynamic and flexible selection of a reputation mechanism for heterogeneous environments, Future Gener. Comput. Syst. (2014).
  • 89
    • 84902106352 scopus 로고    scopus 로고
    • Trust management mechanism for internet of things
    • L. Gu, J. Wang, and B.b. Sun Trust management mechanism for internet of things China Commun. 11 2 2014 148 156
    • (2014) China Commun. , vol.11 , Issue.2 , pp. 148-156
    • Gu, L.1    Wang, J.2    Sun, B.B.3
  • 90
    • 84902819686 scopus 로고    scopus 로고
    • Trust system based on node behavior detection in internet of things
    • Y.-B. Liu, X.-H. Gong, and Y.-F. Feng Trust system based on node behavior detection in internet of things Tongxin Xuebao/J. Commun. 35 5 2014 8 15
    • (2014) Tongxin Xuebao/J. Commun. , vol.35 , Issue.5 , pp. 8-15
    • Liu, Y.-B.1    Gong, X.-H.2    Feng, Y.-F.3
  • 92
    • 80455143726 scopus 로고    scopus 로고
    • Formal enforcement and management of obligation policies
    • Y. Elrakaiby, F. Cuppens, and N. Cuppens-Boulahia Formal enforcement and management of obligation policies Data Knowl. Eng. 71 1 2012 127 147
    • (2012) Data Knowl. Eng. , vol.71 , Issue.1 , pp. 127-147
    • Elrakaiby, Y.1    Cuppens, F.2    Cuppens-Boulahia, N.3
  • 93
    • 79955663408 scopus 로고    scopus 로고
    • An innovative simulation environment for cross-domain policy enforcement
    • Z. Wu, and L. Wang An innovative simulation environment for cross-domain policy enforcement Simul. Model. Pract. Theory 19 7 2011 1558 1583
    • (2011) Simul. Model. Pract. Theory , vol.19 , Issue.7 , pp. 1558-1583
    • Wu, Z.1    Wang, L.2
  • 95
    • 80955142777 scopus 로고    scopus 로고
    • Enforcing privacy in e-commerce by balancing anonymity and trust
    • G. Bella, R. Giustolisi, and S. Riccobene Enforcing privacy in e-commerce by balancing anonymity and trust Comput. Secur. 30 8 2011 705 718
    • (2011) Comput. Secur. , vol.30 , Issue.8 , pp. 705-718
    • Bella, G.1    Giustolisi, R.2    Riccobene, S.3
  • 96
    • 79960004098 scopus 로고    scopus 로고
    • Formal enforcement of security policies on concurrent systems
    • M. Langar, M. Mejri, and K. Adi Formal enforcement of security policies on concurrent systems J. Symbol. Comput. 46 9 2011 997 1016
    • (2011) J. Symbol. Comput. , vol.46 , Issue.9 , pp. 997-1016
    • Langar, M.1    Mejri, M.2    Adi, K.3
  • 97
    • 17944367389 scopus 로고    scopus 로고
    • A brief history of process algebra
    • J. Baeten A brief history of process algebra Theoret. Comput. Sci. 335 2-3 2005 131 146
    • (2005) Theoret. Comput. Sci. , vol.335 , Issue.23 , pp. 131-146
    • Baeten, J.1
  • 98
    • 79954593491 scopus 로고    scopus 로고
    • The policy machine: A novel architecture and framework for access control policy specification and enforcement
    • D. Ferraiolo, V. Atluri, and S. Gavrila The policy machine: a novel architecture and framework for access control policy specification and enforcement J. Syst. Architec. 57 4 2011 412 424
    • (2011) J. Syst. Architec. , vol.57 , Issue.4 , pp. 412-424
    • Ferraiolo, D.1    Atluri, V.2    Gavrila, S.3
  • 100
    • 85033727708 scopus 로고    scopus 로고
    • M. Bishop Computer Security: Art and Science 2003 Addison Wesley
  • 101
    • 58049196928 scopus 로고    scopus 로고
    • A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources
    • J. Rao, A. Sardinha, and N. Sadeh A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources Web Semantics: Sci. Serv. Agents World Wide Web 7 1 2009 40 56
    • (2009) Web Semantics: Sci. Serv. Agents World Wide Web , vol.7 , Issue.1 , pp. 40-56
    • Rao, J.1    Sardinha, A.2    Sadeh, N.3
  • 103
    • 84917692605 scopus 로고    scopus 로고
    • Enforcement of security policy rules for the internet of things
    • Larnaca, Cyprus
    • R. Neisse, G. Steri, G. Baldini, Enforcement of security policy rules for the internet of things, in: Proc. of IEEE WiMob, Larnaca, Cyprus, 2014, pp. 120-127.
    • (2014) Proc. of IEEE WiMob , pp. 120-127
    • Neisse, R.1    Steri, G.2    Baldini, G.3
  • 106
    • 84889100209 scopus 로고    scopus 로고
    • Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications
    • A. Gòmez-Goiri, P. Orduna, J. Diego, and D.L. de Ipina Otsopack: lightweight semantic framework for interoperable ambient intelligence applications Comput. Hum. Behav. 30 2014 460 467
    • (2014) Comput. Hum. Behav. , vol.30 , pp. 460-467
    • Gòmez-Goiri, A.1    Orduna, P.2    Diego, J.3    De Ipina, D.L.4
  • 108
    • 84899656447 scopus 로고    scopus 로고
    • Efficient naming, addressing and profile services in internet-of-things sensory environments
    • C.H. Liu, B. Yang, and T. Liu Efficient naming, addressing and profile services in internet-of-things sensory environments Ad Hoc Netw. 18 0 2013 85 101
    • (2013) Ad Hoc Netw. , vol.18 , pp. 85-101
    • Liu, C.H.1    Yang, B.2    Liu, T.3
  • 109
    • 84919356820 scopus 로고    scopus 로고
    • oneM2M. < http://www.onem2m.org/ >.
  • 110
    • 84907351769 scopus 로고    scopus 로고
    • The problem of task allocation in the internet of things and the consensus-based approach
    • G. Colistra, V. Pilloni, and L. Atzori The problem of task allocation in the internet of things and the consensus-based approach Comput. Netw. 73 0 2014 98 111
    • (2014) Comput. Netw. , vol.73 , pp. 98-111
    • Colistra, G.1    Pilloni, V.2    Atzori, L.3
  • 113
    • 84865157472 scopus 로고    scopus 로고
    • Rapid identification authentication protocol for mobile nodes in internet of things with privacy protection
    • J. Mao, and L. Wang Rapid identification authentication protocol for mobile nodes in internet of things with privacy protection J. Networks 7 7 2012 1099 1105
    • (2012) J. Networks , vol.7 , Issue.7 , pp. 1099-1105
    • Mao, J.1    Wang, L.2
  • 114
    • 84881161741 scopus 로고    scopus 로고
    • Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture
    • A. Jara, V. Kafle, and A. Skarmeta Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture Int. J. Ad Hoc Ubiquitous Comput. 13 3-4 2013 228 242
    • (2013) Int. J. Ad Hoc Ubiquitous Comput. , vol.13 , Issue.34 , pp. 228-242
    • Jara, A.1    Kafle, V.2    Skarmeta, A.3
  • 121
    • 84903725812 scopus 로고    scopus 로고
    • Privacy and authentication protocol for mobile rfid systems
    • B. Niu, X. Zhu, H. Chi, and H. Li Privacy and authentication protocol for mobile rfid systems Wireless Pers. Commun. 77 3 2014 1713 1731
    • (2014) Wireless Pers. Commun. , vol.77 , Issue.3 , pp. 1713-1731
    • Niu, B.1    Zhu, X.2    Chi, H.3    Li, H.4
  • 122
    • 84899414706 scopus 로고    scopus 로고
    • An efficient and secure m-ips scheme of mobile devices for human-centric computing
    • Y.-S. Jeong, J. Lee, J.-B. Lee, J.-J. Jung, and J. Park An efficient and secure m-ips scheme of mobile devices for human-centric computing J. Appl. Math. Special Issue 2014 2014 1 8
    • (2014) J. Appl. Math. Special Issue , vol.2014 , pp. 1-8
    • Jeong, Y.-S.1    Lee, J.2    Lee, J.-B.3    Jung, J.-J.4    Park, J.5
  • 123
    • 84905845325 scopus 로고    scopus 로고
    • Research on mobile information access based on internet of things
    • J. Geng, and X. Xiong Research on mobile information access based on internet of things Appl. Mech. Mater. 539 2014 460 463
    • (2014) Appl. Mech. Mater. , vol.539 , pp. 460-463
    • Geng, J.1    Xiong, X.2
  • 124
    • 85033663362 scopus 로고    scopus 로고
    • S. Kubler, K. Frmling, A. Buda, A standardized approach to deal with firewall and mobility policies in the iot, Pervasive Mobile Comput. (2014).
  • 126
    • 84893739171 scopus 로고    scopus 로고
    • Mobile {IPv6} in internet of things: Analysis, experimentations and optimizations
    • J. Montavont, D. Roth, and T. Nol Mobile {IPv6} in internet of things: analysis, experimentations and optimizations Ad Hoc Netw. 14 0 2014 15 25
    • (2014) Ad Hoc Netw. , vol.14 , pp. 15-25
    • Montavont, J.1    Roth, D.2    Nol, T.3
  • 127
    • 84900441656 scopus 로고    scopus 로고
    • A beaconless opportunistic routing based on a cross-layer approach for efficient video dissemination in mobile multimedia IoT applications
    • D. Rosario, Z. Zhao, A. Santos, T. Braun, and E. Cerqueira A beaconless opportunistic routing based on a cross-layer approach for efficient video dissemination in mobile multimedia IoT applications Comput. Commun. 45 0 2014 21 31
    • (2014) Comput. Commun. , vol.45 , pp. 21-31
    • Rosario, D.1    Zhao, Z.2    Santos, A.3    Braun, T.4    Cerqueira, E.5
  • 128
    • 84904823634 scopus 로고    scopus 로고
    • Using extended web technologies to develop bluetooth multi-platform mobile applications for interact with smart things
    • J.P. Espada, V.G. Daz, R.G. Crespo, O.S. Martnez, B.P. G-Bustelo, and J.M.C. Lovelle Using extended web technologies to develop bluetooth multi-platform mobile applications for interact with smart things Inf. Fusion 21 0 2014 30 41
    • (2014) Inf. Fusion , vol.21 , pp. 30-41
    • Espada, J.P.1    Daz, V.G.2    Crespo, R.G.3    Martnez, O.S.4    G-Bustelo, B.P.5    Lovelle, J.M.C.6
  • 129
    • 84874670418 scopus 로고    scopus 로고
    • Research on social relations cognitive model of mobile nodes in internet of things
    • J. An, X. Gui, W. Zhang, J. Jiang, and J. Yang Research on social relations cognitive model of mobile nodes in internet of things J. Network Comput. Appl. 36 2 2013 799 810
    • (2013) J. Network Comput. Appl. , vol.36 , Issue.2 , pp. 799-810
    • An, J.1    Gui, X.2    Zhang, W.3    Jiang, J.4    Yang, J.5
  • 130
    • 85033726689 scopus 로고    scopus 로고
    • T.-M. Gronli, P. Pourghomi, and G. Ghinea Towards NFC payments using a lightweight architecture for the web of things Computing 2014
  • 131
    • 85033660869 scopus 로고    scopus 로고
    • BUTLER Project. < http://www.iot-butler.eu >.
  • 133
    • 85033675699 scopus 로고    scopus 로고
    • HYDRA Project. < http://www.hydramiddleware.eu/ >.
  • 134
    • 85033704590 scopus 로고    scopus 로고
    • Usable Trust in the Internet of Things. < http://www.utrustit.eu/ >.
  • 135
    • 85033711308 scopus 로고    scopus 로고
    • iCORE Project. < http://www.iot-icore.eu >.
  • 136
    • 85033661273 scopus 로고    scopus 로고
    • HACMS Project. < http://www.defenseone.com/technology >.
  • 137
    • 85033696203 scopus 로고    scopus 로고
    • National Science Foundation Project. < http://www.nsf.gov >.
  • 138
    • 85033670582 scopus 로고    scopus 로고
    • Roseline Project. < https://sites.google.com/site/roselineproject/ >.
  • 139
    • 85033716996 scopus 로고    scopus 로고
    • XIA-NP Project. < http://www.cs.cmu.edu/xia/ >.
  • 140
    • 85033698127 scopus 로고    scopus 로고
    • NDN-NP Project. < http://named-data.net/ >.
  • 141
    • 85033730121 scopus 로고    scopus 로고
    • NEBULA Project. < http://nebula-fia.org/ >.
  • 142
    • 85033707633 scopus 로고    scopus 로고
    • MobilityFirst-NP Project. < http://mobilityfirst.winlab.rutgers.edu/ >.
  • 143
    • 84855608079 scopus 로고    scopus 로고
    • Internet of things: Objectives and scientific challenges
    • H.-D. Ma Internet of things: objectives and scientific challenges J. Comput. Sci. Technol. 26 6 2011 919 924
    • (2011) J. Comput. Sci. Technol. , vol.26 , Issue.6 , pp. 919-924
    • Ma, H.-D.1
  • 144
    • 85033709977 scopus 로고    scopus 로고
    • FIRE EU-China Project. < http://www.euchina-fire.eu/ >.
  • 145
    • 85033722074 scopus 로고    scopus 로고
    • FIRE EU-Korea Project. < http://eukorea-fire.eu/ >.
  • 146
    • 85033688643 scopus 로고    scopus 로고
    • EU-Japan Project. < http://www.eurojapan-ict.org/ >.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.