메뉴 건너뛰기




Volumn 49, Issue , 2015, Pages 112-127

Autonomic schemes for threat mitigation in Internet of Things

Author keywords

Autonomy; Internet of Things; Security; Self management; Self security; Wireless sensor networks

Indexed keywords

INTERNET; SECURITY OF DATA; SURVEYS; WIRELESS SENSOR NETWORKS;

EID: 84920181628     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2014.11.011     Document Type: Review
Times cited : (125)

References (135)
  • 1
    • 84876783313 scopus 로고    scopus 로고
    • Lightweight Sybil attack detection in MANETs
    • S Abbas, M Merabti, D Llewellyn-Jones, and K Kifayat Lightweight Sybil attack detection in MANETs IEEE Syst J 7 2 2013 236 248 10.1109/JSYST.2012.2221912
    • (2013) IEEE Syst J , vol.7 , Issue.2 , pp. 236-248
    • Abbas, S.1    Merabti, M.2    Llewellyn-Jones, D.3    Kifayat, K.4
  • 3
    • 0035120939 scopus 로고    scopus 로고
    • Toward self-healing energy infrastructure systems
    • M Amin Toward self-healing energy infrastructure systems IEEE Comput Appl Power 14 1 2002 20 28 10.1109/67.893351
    • (2002) IEEE Comput Appl Power , vol.14 , Issue.1 , pp. 20-28
    • Amin, M.1
  • 5
    • 84920197756 scopus 로고    scopus 로고
    • SIHAT: Simplifying interfaces in health-nets for achieving telemetry
    • Qazi Muhammad Adnan Hye, Pak Publishing Group Pakistan
    • Q.M. Ashraf, M.H. Habaebi, and J. Chebil SIHAT: simplifying interfaces in health-nets for achieving telemetry Qazi Muhammad Adnan Hye, Handbook on the emerging trends in scientific research 2014 Pak Publishing Group Pakistan 207 217
    • (2014) Handbook on the Emerging Trends in Scientific Research , pp. 207-217
    • Ashraf, Q.M.1    Habaebi, M.H.2    Chebil, J.3
  • 10
    • 34047126869 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
    • P Baronti, P Pillai, VWC Chook, S Chessa, A Gotta, and YF. Hu Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards Comput Commun 30 7 2007 1655 1695 10.1016/j.comcom.2006.12.020
    • (2007) Comput Commun , vol.30 , Issue.7 , pp. 1655-1695
    • Baronti, P.1    Pillai, P.2    Chook, V.W.C.3    Chessa, S.4    Gotta, A.5    Hu, Y.F.6
  • 11
    • 84901475866 scopus 로고    scopus 로고
    • Monitoring in mobile ad hoc networks: A survey
    • N Battat, H Seba, and H. Kheddouci Monitoring in mobile ad hoc networks: a survey Comput Netw 69 2014 82 100 10.1016/j.comnet.2014.04.013
    • (2014) Comput Netw , vol.69 , pp. 82-100
    • Battat, N.1    Seba, H.2    Kheddouci, H.3
  • 14
    • 84888012453 scopus 로고    scopus 로고
    • Joint reactive jammer detection and localization in an enterprise WiFi network
    • Y Cai, K Pelechrinis, X Wang, P Krishnamurthy, and Y. Mo Joint reactive jammer detection and localization in an enterprise WiFi network Comput Netw 57 18 2013 3799 3811 10.1016/j.comnet.2013.09.004
    • (2013) Comput Netw , vol.57 , Issue.18 , pp. 3799-3811
    • Cai, Y.1    Pelechrinis, K.2    Wang, X.3    Krishnamurthy, P.4    Mo, Y.5
  • 16
    • 84920112677 scopus 로고    scopus 로고
    • Detection and mitigation of MITM attacks in storage cloud infrastructures
    • J Carmilema, MA Medrano, and D. Flores Detection and mitigation of MITM attacks in storage cloud infrastructures Rev Digit Cient Technol 1 2012 26 30
    • (2012) Rev Digit Cient Technol , vol.1 , pp. 26-30
    • Carmilema, J.1    Medrano, M.A.2    Flores, D.3
  • 22
    • 0003247337 scopus 로고    scopus 로고
    • Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations [Internet]
    • [cited 2014 Sep 14]. Available from
    • Corson S, Macker J. Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations [Internet]. Internet Engineering Task Force; 1999 [cited 2014 Sep 14]. Available from 〈http://tools.ietf.org/html/rfc2501〉.
    • (1999) Internet Engineering Task Force
    • Corson, S.1    Macker, J.2
  • 23
    • 84884231488 scopus 로고    scopus 로고
    • On eavesdropping attacks in wireless sensor networks with directional antennas
    • HN Dai, Q Wang, D Li, and RCW Wong On eavesdropping attacks in wireless sensor networks with directional antennas Int J Distrib Sens Netw 2013 2013 1 13 10.1155/2013/760834
    • (2013) Int J Distrib Sens Netw , vol.2013 , pp. 1-13
    • Dai, H.N.1    Wang, Q.2    Li, D.3    Wong, R.C.W.4
  • 26
    • 58149086240 scopus 로고    scopus 로고
    • POSH: Proactive co-operative self-healing in unattended wireless sensor networks
    • Naples(Italy): Institute of Electrical and Electronics Engineers
    • Di Pietro R, Ma D, Soriente C, Tsudik G. POSH: Proactive co-operative self-healing in unattended wireless sensor networks. In: Proceedings of IEEE symposium on reliable distributed system, SRDS 2008. Naples(Italy): Institute of Electrical and Electronics Engineers, 10.1109/SRDS.2008.23; 2008. p. 185-94.
    • (2008) Proceedings of IEEE Symposium on Reliable Distributed System, SRDS 2008 , pp. 185-194
    • Di Pietro, R.1    Ma, D.2    Soriente, C.3    Tsudik, G.4
  • 29
    • 38549139180 scopus 로고    scopus 로고
    • Constant storage self-healing key distribution with revocation in wireless sensor network
    • Glasgow(Scotland): Institute of Electrical and Electronics Engineers
    • Dutta R, Dong Wu Y, Mukhopadhyay S. Constant storage self-healing key distribution with revocation in wireless sensor network. In: Proceedings of IEEE international conference on communications, ICC 2007. Glasgow(Scotland): Institute of Electrical and Electronics Engineers, 10.1109/ICC.2007.223; 2007. 1323-28.
    • (2007) Proceedings of IEEE International Conference on Communications, ICC 2007 , pp. 1323-1328
    • Dutta, R.1    Dong Wu, Y.2    Mukhopadhyay, S.3
  • 36
    • 85027949525 scopus 로고    scopus 로고
    • A survey of broadcast authentication schemes for wireless sensor networks
    • K Grover, and A Lim A survey of broadcast authentication schemes for wireless sensor networks Ad Hoc Netw 24(A) 2015 288 316 10.1016/j.adhoc.2014.06.008
    • (2015) Ad Hoc Netw , vol.24 A , pp. 288-316
    • Grover, K.1    Lim, A.2
  • 37
    • 84902106352 scopus 로고    scopus 로고
    • Trust management mechanism for Internet of Things
    • L Gu, J Wang, and B Sun Trust management mechanism for Internet of Things Ch Commun 11 2 2014 148 156 10.1109/CC.2014.6821746
    • (2014) Ch Commun , vol.11 , Issue.2 , pp. 148-156
    • Gu, L.1    Wang, J.2    Sun, B.3
  • 38
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J Gubbi, R Buyya, S Marusic, and M Palaniswami Internet of Things (IoT): a vision, architectural elements, and future directions Future Gener Comput Syst 29 7 2013 1645 1660 10.1016/j.future.2013.01.010
    • (2013) Future Gener Comput Syst , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 41
    • 84927518156 scopus 로고    scopus 로고
    • Trust-based decision-making for energy-aware device management
    • Dimitrova Vania, Kuflik Tsvi, Chin David, Ricci Francesco, Dolog Peter, Houben Geert-Jan, Springer International Publishing Switzerland
    • S. Hammer, M. Wißner, and E. André Trust-based decision-making for energy-aware device management Dimitrova Vania, Kuflik Tsvi, Chin David, Ricci Francesco, Dolog Peter, Houben Geert-Jan, User modeling, adaptation, and personalization 2014 Springer International Publishing Switzerland 326 337 10.1007/978-3-319-08786-3-29
    • (2014) User Modeling, Adaptation, and Personalization , pp. 326-337
    • Hammer, S.1    Wißner, M.2    André, E.3
  • 42
    • 65949120002 scopus 로고    scopus 로고
    • Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
    • S Han, B Tian, M He, and E Chang Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks IEEE Trans Wirel Commun 8 4 2009 1876 1887 10.1109/TWC.2009.080046
    • (2009) IEEE Trans Wirel Commun , vol.8 , Issue.4 , pp. 1876-1887
    • Han, S.1    Tian, B.2    He, M.3    Chang, E.4
  • 44
    • 84920121658 scopus 로고    scopus 로고
    • Internet Engineering Task Force [cited 2014 Sep 10]. Available from
    • Hartke K, Bergmann O. DTLS In constrained environments (DICE) [Internet]. Internet Engineering Task Force; 2013 [cited 2014 Sep 10]. Available from: 〈http://www.ietf.org/proceedings/83/slides/slides-83-lwig-2.pdf〉.
    • (2013) DTLS in Constrained Environments (DICE) [Internet]
    • Hartke, K.1    Bergmann, O.2
  • 45
    • 84863512174 scopus 로고    scopus 로고
    • ReTrust: Attack-resistant and lightweight trust management for medical sensor networks
    • D He, C Chen, S Chan, J Bu, and AV Vasilakos ReTrust: attack-resistant and lightweight trust management for medical sensor networks IEEE Trans Inf Technol Biomed 16 4 2012 623 632 10.1109/TITB.2012.2194788
    • (2012) IEEE Trans Inf Technol Biomed , vol.16 , Issue.4 , pp. 623-632
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4    Vasilakos, A.V.5
  • 46
    • 35048847641 scopus 로고    scopus 로고
    • Tackling security and privacy issues in radio frequency identification devices
    • Ferscha Alois, Mattern Friedemann, Berlin Heidelberg Springer
    • D. Henrici, and P. Müller Tackling security and privacy issues in radio frequency identification devices Ferscha Alois, Mattern Friedemann, Pervasive computing 2004 Berlin Heidelberg Springer 219 224 10.1007/978-3-540-24646-6-16
    • (2004) Pervasive Computing , pp. 219-224
    • Henrici, D.1    Müller, P.2
  • 48
    • 42449088961 scopus 로고    scopus 로고
    • A survey of autonomic computing-degrees, models, and applications
    • MC Huebscher, and JA McCann A survey of autonomic computing-degrees, models, and applications ACM Comput Surv 40 3 2008 2 28 10.1145/1380584.1380585
    • (2008) ACM Comput Surv , vol.40 , Issue.3 , pp. 2-28
    • Huebscher, M.C.1    McCann, J.A.2
  • 50
    • 0343770530 scopus 로고
    • Autonomic nervous system
    • Schmidt Robert F., Thews Gerhrad, Berlin Heidelberg Springer
    • W. Jänig Autonomic nervous system Schmidt Robert F., Thews Gerhrad, Human physiology 1989 Berlin Heidelberg Springer 333 370
    • (1989) Human Physiology , pp. 333-370
    • Jänig, W.1
  • 51
    • 23944476196 scopus 로고    scopus 로고
    • Minimalist cryptography for low-cost RFID tags
    • Blundo Carlo, Cimato Stelvio, Springer Berlin Heidelberg
    • A. Juels Minimalist cryptography for low-cost RFID tags Blundo Carlo, Cimato Stelvio, Security in communication networks 2005 Springer Berlin Heidelberg 149 164 10.1007/978-3-540-30598-9-11
    • (2005) Security in Communication Networks , pp. 149-164
    • Juels, A.1
  • 53
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in system design: The pris method
    • C Kalloniatis, E Kavakli, and S Gritzalis Addressing privacy requirements in system design: the pris method Requir Eng 13 3 2008 241 255 10.1007/s00766-008-0067-3
    • (2008) Requir Eng , vol.13 , Issue.3 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 54
    • 85008244129 scopus 로고    scopus 로고
    • A survey of security mechanisms with direct sequence spread spectrum signals
    • T Kang, X Li, C Yu, and J Kim A survey of security mechanisms with direct sequence spread spectrum signals J Comput Sci Eng 7 3 2013 187 197 10.5626/JCSE.2013.7.3.187
    • (2013) J Comput Sci Eng , vol.7 , Issue.3 , pp. 187-197
    • Kang, T.1    Li, X.2    Yu, C.3    Kim, J.4
  • 56
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • JO Kephart, and DM Chess The vision of autonomic computing Computer 36 1 2003 41 50 10.1109/MC.2003.1160055
    • (2003) Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.O.1    Chess, D.M.2
  • 61
    • 84885304488 scopus 로고    scopus 로고
    • DTLS based security and two-way authentication for the Internet of Things
    • T Kothmayr, C Schmitt, W Hu, M Brünig, and G Carle DTLS based security and two-way authentication for the Internet of Things Ad Hoc Netw 11 8 2013 2710 2723 10.1016/j.adhoc.2013.05.003
    • (2013) Ad Hoc Netw , vol.11 , Issue.8 , pp. 2710-2723
    • Kothmayr, T.1    Schmitt, C.2    Hu, W.3    Brünig, M.4    Carle, G.5
  • 62
    • 49949111918 scopus 로고    scopus 로고
    • Intrusion detection of sinkhole attacks in wireless sensor networks
    • Kutylowski Miroslaw, Cichon Jacek, Kubiak Przemyslaw, Springer Berlin Heidelberg
    • I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos Intrusion detection of sinkhole attacks in wireless sensor networks Kutylowski Miroslaw, Cichon Jacek, Kubiak Przemyslaw, Algorithmic aspects of wireless sensor networks 2008 Springer Berlin Heidelberg 150 161 10.1007/978-3-540-77871-4-14
    • (2008) Algorithmic Aspects of Wireless Sensor Networks , pp. 150-161
    • Krontiris, I.1    Dimitriou, T.2    Giannetsos, T.3    Mpasoukos, M.4
  • 63
    • 84930759603 scopus 로고    scopus 로고
    • [Internet]. Internet Engineering Task Force [cited 2014 Sep 7]. Available from
    • Kumar S. Group communication security for low-power and lossy networks (LLNs) [Internet]. Internet Engineering Task Force; 2014 [cited 2014 Sep 7]. Available from: 〈https://datatracker.ietf.org/doc/draft-kumar-dice-groupcomm-security/〉.
    • (2014) Group Communication Security for Low-power and Lossy Networks (LLNs)
    • Kumar, S.1
  • 65
    • 84890106421 scopus 로고    scopus 로고
    • Future of autonomic computing and conclusions
    • Lalanda Philippe, McCann Julie A, Diaconescu Ada, Springer London
    • P. Lalanda, J.A. McCann, and A. Diaconescu Future of autonomic computing and conclusions Lalanda Philippe, McCann Julie A, Diaconescu Ada, Autonomic computing: principles, design and implementation 2013 Springer London 263 278 10.1007/978-1-4471-5007-7-10
    • (2013) Autonomic Computing: Principles, Design and Implementation , pp. 263-278
    • Lalanda, P.1    McCann, J.A.2    Diaconescu, A.3
  • 67
    • 84902197946 scopus 로고    scopus 로고
    • LSR: Mitigating zero-day Sybil vulnerability in privacy-preserving vehicular peer-to-peer networks
    • X Lin LSR: mitigating zero-day Sybil vulnerability in privacy-preserving vehicular peer-to-peer networks IEEE J Sel Areas Commun 31 9 2013 237 246 10.1109/JSAC.2013.SUP.0513021
    • (2013) IEEE J Sel Areas Commun , vol.31 , Issue.9 , pp. 237-246
    • Lin, X.1
  • 69
    • 84866349735 scopus 로고    scopus 로고
    • Authenctication and access control in the Internet of Things
    • Fàbrega Lluís, Vilà Pere, Careglio Davide, Papadimitriou Dimitri, Institute of Electrical and Electronics Engineers Macau(China)
    • J. Liu, Y. Xiao, and C.L.P. Chen Authenctication and access control in the Internet of Things Fàbrega Lluís, Vilà Pere, Careglio Davide, Papadimitriou Dimitri, Proceedings of 32nd international conference on distributed computing systems workshops, ICDCSW 2012 Institute of Electrical and Electronics Engineers Macau(China) 588 592 10.1109/ICDCSW.2012.23
    • (2012) Proceedings of 32nd International Conference on Distributed Computing Systems Workshops, ICDCSW , pp. 588-592
    • Liu, J.1    Xiao, Y.2    Chen, C.L.P.3
  • 71
    • 77955405219 scopus 로고    scopus 로고
    • Wireless jamming localization by exploiting nodes' hearing ranges
    • Rajmohan Rajaraman, Thoma, s Moscibroda, Adam Dunkels, Anna Scaglione (Eds.)
    • Liu Z, Liu H, Xu W, Chen Y. Wireless jamming localization by exploiting nodes' hearing ranges. Rajmohan Rajaraman, Thoma, s Moscibroda, Adam Dunkels, Anna Scaglione (Eds.) In: Distributed computing in sensor systems. Berlin Heidelberg: Springer, 10.1007/978-3-642-13651-1-25; 2010. p. 348-61.
    • (2010) Distributed Computing in Sensor Systems. Berlin Heidelberg: Springer , pp. 348-361
    • Liu, Z.1    Liu, H.2    Xu, W.3    Chen, Y.4
  • 72
    • 84920148551 scopus 로고    scopus 로고
    • International Business Machines Corporation (IBM) [cited 2014 Aug 14] Available from
    • Locke D. MQTT V3.1 Protocol Specification [Internet]. International Business Machines Corporation (IBM); 2011. [cited 2014 Aug 14] Available from: 〈http://www.ibm.com/developerworks/library/ws-mqtt/〉.
    • (2011) MQTT V3.1 Protocol Specification [Internet]
    • Locke, D.1
  • 76
    • 79952824469 scopus 로고    scopus 로고
    • Low energy symmetric key distribution in wireless sensor networks
    • K McCusker, and NE O'Connor Low energy symmetric key distribution in wireless sensor networks IEEE Trans Depend Secur Comput 8 3 2011 363 376 10.1109/TDSC.2010.73
    • (2011) IEEE Trans Depend Secur Comput , vol.8 , Issue.3 , pp. 363-376
    • McCusker, K.1    O'Connor, N.E.2
  • 77
    • 1142301940 scopus 로고    scopus 로고
    • Authentication and its privacy effects
    • LI Millett, and SH Holden Authentication and its privacy effects IEEE Internet Comput 7 6 2003 54 58 10.1109/MIC.2003.1250584
    • (2003) IEEE Internet Comput , vol.7 , Issue.6 , pp. 54-58
    • Millett, L.I.1    Holden, S.H.2
  • 78
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision, applications and research challenges
    • D Miorandi, S Sicari, F De Pellegrini, and I Chlamtac Internet of things: vision, applications and research challenges Ad Hoc Netw 10 7 2012 1497 1516 10.1016/j.adhoc.2012.02.016
    • (2012) Ad Hoc Netw , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 79
    • 78650025148 scopus 로고    scopus 로고
    • Authentication and lightweight cryptography in low cost RFID
    • San Juan(United States of America): Institute of Electrical and Electronics Engineers
    • Mobahat H. Authentication and lightweight cryptography in low cost RFID. In: Proceedings of 2nd international conference on software technology and engineering, ICSTE 2010. San Juan(United States of America): Institute of Electrical and Electronics Engineers, 10.1109/ICSTE.2010.5608776; 2010. 123-9.
    • (2010) Proceedings of 2nd International Conference on Software Technology and Engineering, ICSTE 2010 , pp. 123-129
    • Mobahat, H.1
  • 80
    • 84920157313 scopus 로고    scopus 로고
    • A survey on mitigation methods to black hole attack on AODV routing protocol
    • A Mohebi, and S. Scott A survey on mitigation methods to black hole attack on AODV routing protocol Netw Complex Syst 3 9 2013 30 36
    • (2013) Netw Complex Syst , vol.3 , Issue.9 , pp. 30-36
    • Mohebi, A.1    Scott, S.2
  • 81
    • 84876156481 scopus 로고    scopus 로고
    • Cyber-entity security in the Internet of Things
    • H Ning, H Liu, and LT Yang Cyber-entity security in the Internet of Things Computer 46 4 2013 46 53 10.1109/MC.2013.74
    • (2013) Computer , vol.46 , Issue.4 , pp. 46-53
    • Ning, H.1    Liu, H.2    Yang, L.T.3
  • 83
    • 84893764188 scopus 로고    scopus 로고
    • The Internet of Things: Do more devices mean more risks?
    • M O'Neill The Internet of Things: do more devices mean more risks? Comput Fraud Secur 2014 1 2014 16 17 10.1016/S1361-3723(14)70008-9
    • (2014) Comput Fraud Secur , vol.2014 , Issue.1 , pp. 16-17
    • O'Neill, M.1
  • 84
    • 79960017240 scopus 로고    scopus 로고
    • A survey of the research on future Internet architectures
    • J Pan, S Paul, and R. Jain A survey of the research on future Internet architectures IEEE Commun Mag 49 7 2011 26 36 10.1109/MCOM.2011.5936152
    • (2011) IEEE Commun Mag , vol.49 , Issue.7 , pp. 26-36
    • Pan, J.1    Paul, S.2    Jain, R.3
  • 86
    • 80053951920 scopus 로고    scopus 로고
    • Securing dynamic distributed storage systems against eavesdropping and adversarial attacks
    • S Pawar, S El Rouayheb, and K. Ramchandran Securing dynamic distributed storage systems against eavesdropping and adversarial attacks IEEE Trans Inf Theory 57 11 2011 6734 6753 10.1109/TIT.2011.2162191
    • (2011) IEEE Trans Inf Theory , vol.57 , Issue.11 , pp. 6734-6753
    • Pawar, S.1    El Rouayheb, S.2    Ramchandran, K.3
  • 89
  • 92
    • 84874841077 scopus 로고    scopus 로고
    • How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack
    • W Ren, L Yu, L Ma, and Y. Ren How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack Int J Distrib Sens Netw 2013 2013 1 9
    • (2013) Int J Distrib Sens Netw , vol.2013 , pp. 1-9
    • Ren, W.1    Yu, L.2    Ma, L.3    Ren, Y.4
  • 94
    • 80052854156 scopus 로고    scopus 로고
    • Securing the Internet of Things
    • R Roman, P Najera, and J Lopez Securing the Internet of Things Computer 44 9 2011 51 58 10.1109/MC.2011.291
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 95
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed Internet of Things
    • R Roman, J Zhou, and J. Lopez On the features and challenges of security and privacy in distributed Internet of Things Comput Netw 10 2013 2266 2279 10.1016/j.comnet.2012.12.018
    • (2013) Comput Netw , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 96
    • 84863304238 scopus 로고    scopus 로고
    • Secure and reliable clustering in wireless sensor networks: A critical survey
    • P Schaffer, K Farkas, Á Horváth, T Holczer, and L. Buttyán Secure and reliable clustering in wireless sensor networks: a critical survey Comput Netw 56 11 2012 2726 2741 10.1016/j.comnet.2012.03.021
    • (2012) Comput Netw , vol.56 , Issue.11 , pp. 2726-2741
    • Schaffer, P.1    Farkas, K.2    Horváth Á.3    Holczer, T.4    Buttyán, L.5
  • 97
    • 84871786265 scopus 로고    scopus 로고
    • Management of resource constrained devices in the Internet of Things
    • A Sehgal, V Perelman, S Kuryla, and J. Schonwalder Management of resource constrained devices in the Internet of Things IEEE Commun Mag 50 12 2012 144 149 10.1109/MCOM.2012.6384464
    • (2012) IEEE Commun Mag , vol.50 , Issue.12 , pp. 144-149
    • Sehgal, A.1    Perelman, V.2    Kuryla, S.3    Schonwalder, J.4
  • 99
    • 84891959392 scopus 로고    scopus 로고
    • Detection and mitigation of sinkhole attacks in wireless sensor networks
    • H Shafiei, A Khonsari, H Derakhshi, and P. Mousavi Detection and mitigation of sinkhole attacks in wireless sensor networks J Comput Syst Sci 80 3 2014 644 653 10.1016/j.jcss.2013.06.016
    • (2014) J Comput Syst Sci , vol.80 , Issue.3 , pp. 644-653
    • Shafiei, H.1    Khonsari, A.2    Derakhshi, H.3    Mousavi, P.4
  • 103
    • 84892614267 scopus 로고    scopus 로고
    • A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities
    • Z Sheng, S Yang, Y Yu, AV Vasilakos, JA McCann, and KK Leung A survey on the IETF protocol suite for the Internet of Things: standards, challenges, and opportunities IEEE Wirel Commun 20 6 2013 91 98 10.1109/MWC.2013.6704479
    • (2013) IEEE Wirel Commun , vol.20 , Issue.6 , pp. 91-98
    • Sheng, Z.1    Yang, S.2    Yu, Y.3    Vasilakos, A.V.4    McCann, J.A.5    Leung, K.K.6
  • 104
    • 84938746527 scopus 로고    scopus 로고
    • On the security of a certificateless online/offline signcryption for Internet of Things
    • W Shi, N Kumar, P Gong, N Chilamkurti, and H. Chang On the security of a certificateless online/offline signcryption for Internet of Things Peer-to-Peer Netw Appl 2014 1 5 10.1007/s12083-014-0249-3
    • (2014) Peer-to-Peer Netw Appl , pp. 1-5
    • Shi, W.1    Kumar, N.2    Gong, P.3    Chilamkurti, N.4    Chang, H.5
  • 105
    • 51349122673 scopus 로고    scopus 로고
    • Defending selective forwarding attacks in WMNs
    • Ames(United States of America): Institute of Electrical and Electronics Engineers
    • Shila DM, Anjali T. Defending selective forwarding attacks in WMNs. In: Proceedings of IEEE international conference on electro/information technology, EIT 2008. Ames(United States of America): Institute of Electrical and Electronics Engineers, 10.1109/EIT.2008.4554274; 2008. 96-101.
    • (2008) Proceedings of IEEE International Conference on Electro/information Technology, EIT 2008 , pp. 96-101
    • Shila, D.M.1    Anjali, T.2
  • 106
    • 84901493878 scopus 로고    scopus 로고
    • Design and implementation of spectrally-encoded spread-time CDMA transceiver
    • M Shoreh, H Hosseinianfar, F Akhoundi, E Yazdian, M Farhang, and J. Salehi Design and implementation of spectrally-encoded spread-time CDMA transceiver IEEE Commun Lett 18 5 2014 741 744 10.1109/LCOMM.2014.033114.132471
    • (2014) IEEE Commun Lett , vol.18 , Issue.5 , pp. 741-744
    • Shoreh, M.1    Hosseinianfar, H.2    Akhoundi, F.3    Yazdian, E.4    Farhang, M.5    Salehi, J.6
  • 107
    • 79961235838 scopus 로고    scopus 로고
    • Hello flood attack and its countermeasures in wireless sensor networks
    • VP Singh, S Jain, and J. Singhai Hello flood attack and its countermeasures in wireless sensor networks Int J Comput Sci 7 11 2010 23 27
    • (2010) Int J Comput Sci , vol.7 , Issue.11 , pp. 23-27
    • Singh, V.P.1    Jain, S.2    Singhai, J.3
  • 109
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalisation and suppression
    • L. Sweeney Achieving k-anonymity privacy protection using generalisation and suppression Int J Uncertain Fuzziness Knowl-Based Syst 10 5 2002 571 588 10.1142/S021848850200165X
    • (2002) Int J Uncertain Fuzziness Knowl-Based Syst , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 112
    • 84902447939 scopus 로고    scopus 로고
    • The ASSL formalism for real-time autonomic systems
    • Higuera-Toledano Teresa-M, Brinkschulte Uwe, Rettberg Achim, Springer New York
    • E. Vassev, and M. Hinchey The ASSL formalism for real-time autonomic systems Higuera-Toledano Teresa-M, Brinkschulte Uwe, Rettberg Achim, Self-organization in embedded real-time systems 2013 Springer New York 151 177 10.1007/978-1-4614-1969-3-8
    • (2013) Self-organization in Embedded Real-time Systems , pp. 151-177
    • Vassev, E.1    Hinchey, M.2
  • 114
    • 50249129528 scopus 로고    scopus 로고
    • Self-healing wireless sensor networks: Results that may surpirse
    • Washington (United States of America): Institute of Electrical and Electronics Engineers
    • Vlajic N, Moniz N. Self-healing wireless sensor networks: results that may surpirse. In: Proceedings of IEEE globecom workshops. Washington (United States of America): Institute of Electrical and Electronics Engineers, 10.1109/GLOCOMW.2007.4437830; 2007. 1-7.
    • (2007) Proceedings of IEEE Globecom Workshops , pp. 1-7
    • Vlajic, N.1    Moniz, N.2
  • 116
    • 51649100978 scopus 로고    scopus 로고
    • Efficient algorithms for p-self-protection problem in static wireless sensor networks
    • Y Wang, M Li, and Q. Zhang Efficient algorithms for p-self-protection problem in static wireless sensor networks IEEE Trans Parallel Distrib Syst 19 10 2008 1426 1438 10.1109/TPDS.2008.13
    • (2008) IEEE Trans Parallel Distrib Syst , vol.19 , Issue.10 , pp. 1426-1438
    • Wang, Y.1    Li, M.2    Zhang, Q.3
  • 117
    • 78751650165 scopus 로고    scopus 로고
    • P2P soft security: On evolutionary dynamics of P2P incentive mechanism
    • Y Wang, A Nakao, AV Vasilakos, and J Ma P2P soft security: on evolutionary dynamics of P2P incentive mechanism Comput Commun 34 3 2011 241 249 10.1016/j.comcom.2010.01.021
    • (2011) Comput Commun , vol.34 , Issue.3 , pp. 241-249
    • Wang, Y.1    Nakao, A.2    Vasilakos, A.V.3    Ma, J.4
  • 119
    • 84893270272 scopus 로고    scopus 로고
    • From MANET to IETF ROLL Standardization: A paradigm shift in WSN routing protocols
    • T Watteyne, A Molinaro, MG Richichi, and M. Dohler From MANET to IETF ROLL Standardization: a paradigm shift in WSN routing protocols IEEE Commun Surv Tutor 13 4 2011 688 707 10.1109/SURV.2011.082710.00092
    • (2011) IEEE Commun Surv Tutor , vol.13 , Issue.4 , pp. 688-707
    • Watteyne, T.1    Molinaro, A.2    Richichi, M.G.3    Dohler, M.4
  • 120
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • L Wei, H Zhu, Z Cao, X Dong, W Jia, and Y Chen Security and privacy for storage and computation in cloud computing Inf Sci 258 2014 371 386 10.1016/j.ins.2013.04.028
    • (2014) Inf Sci , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6
  • 122
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Hutter Dieter, Müller Günter, Stephan Werner, Ullmann Markus, Springer Berlin Heidelberg
    • S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels Security and privacy aspects of low-cost radio frequency identification systems Hutter Dieter, Müller Günter, Stephan Werner, Ullmann Markus, Security in pervasive computing 2004 Springer Berlin Heidelberg 201 212 10.1007/978-3-540-39881-3-18
    • (2004) Security in Pervasive Computing , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 125
    • 84898646564 scopus 로고    scopus 로고
    • Trust-based adaptive routing for smart grid systems
    • M Xiang, Q Bai, and W Liu Trust-based adaptive routing for smart grid systems J Inf Process 22 2 2014 210 218 10.2197/ipsjjip.22.210
    • (2014) J Inf Process , vol.22 , Issue.2 , pp. 210-218
    • Xiang, M.1    Bai, Q.2    Liu, W.3
  • 127
    • 84901427258 scopus 로고    scopus 로고
    • A survey on trust management for Internet of Things
    • Z Yan, P Zhang, and AV Vasilakos A survey on trust management for Internet of Things J Netw Comput Appl 42 2014 120 134 10.1016/j.jnca.2014.01.014
    • (2014) J Netw Comput Appl , vol.42 , pp. 120-134
    • Yan, Z.1    Zhang, P.2    Vasilakos, A.V.3
  • 128
    • 45749116664 scopus 로고    scopus 로고
    • SybilLimit: A near-optimal social network defense against Sybil attacks
    • Oakland(United States of America): Institute of Electrical and Electronics Engineers, doi:
    • Yu H, Gibbons PB, Kaminsky M, Xiao F. SybilLimit: a near-optimal social network defense against Sybil attacks. In: Proceedings of symposium on security and privacy, SP 2008. Oakland(United States of America): Institute of Electrical and Electronics Engineers, doi: 10.1109/SP.2008.13; 2008a. 3-17.
    • (2008) Proceedings of Symposium on Security and Privacy, SP 2008 , pp. 3-17
    • Yu, H.1    Gibbons, P.B.2    Kaminsky, M.3    Xiao, F.4
  • 129
    • 45749109010 scopus 로고    scopus 로고
    • SybilGuard: Defending against Sybil attacks via social networks
    • H Yu, M Kaminsky, PB Gibbons, and AD Flaxman SybilGuard: defending against Sybil attacks via social networks IEEE/ACM Trans Netw 16 3 2008 576 589 10.1109/TNET.2008.923723
    • (2008) IEEE/ACM Trans Netw , vol.16 , Issue.3 , pp. 576-589
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.D.4
  • 130
    • 79960389467 scopus 로고    scopus 로고
    • Evaluation on security system of Internet of Things based on fuzzy-AHP method
    • Shanghai (China): Institute of Electrical and Electronics Engineers
    • Zhang B, Zou Z, Liu M. Evaluation on security system of Internet of Things based on fuzzy-AHP method. In: Proceedings of the international conference on e-business and e-government, ICEE 2011. Shanghai (China): Institute of Electrical and Electronics Engineers, 10.1109/ICEBEG.2011.5881939; 2011. 1-5.
    • (2011) Proceedings of the International Conference on E-business and E-government, ICEE 2011 , pp. 1-5
    • Zhang, B.1    Zou, Z.2    Liu, M.3
  • 131
    • 0141621108 scopus 로고    scopus 로고
    • GS3: Scalable self-configuring and self-healing in wireless sensor networks
    • H Zhang, and A. Arora GS3: scalable self-configuring and self-healing in wireless sensor networks Comput Netw 43 4 2003 459 480 10.1016/S1389-1286(03)00354-2
    • (2003) Comput Netw , vol.43 , Issue.4 , pp. 459-480
    • Zhang, H.1    Arora, A.2
  • 134
    • 79957583041 scopus 로고    scopus 로고
    • Multimedia traffic security architecture for the Internet of Things
    • L Zhou, and HC. Chao Multimedia traffic security architecture for the Internet of Things IEEE Netw 25 3 2011 35 40 10.1109/MNET.2011.5772059
    • (2011) IEEE Netw , vol.25 , Issue.3 , pp. 35-40
    • Zhou, L.1    Chao, H.C.2
  • 135
    • 79951967501 scopus 로고    scopus 로고
    • P2DAP- Sybil attacks detection in vehicular ad hoc networks
    • T Zhou, RR Choudhury, P Ning, and K. Chakrabarty P2DAP- Sybil attacks detection in vehicular ad hoc networks IEEE J Sel Areas Commun 29 3 2011 582 594 10.1109/JSAC.2011.110308
    • (2011) IEEE J Sel Areas Commun , vol.29 , Issue.3 , pp. 582-594
    • Zhou, T.1    Choudhury, R.R.2    Ning, P.3    Chakrabarty, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.