메뉴 건너뛰기




Volumn , Issue , 2014, Pages 67-72

Securing smart home: Technologies, security challenges, and security requirements

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; HOUSING; INTELLIGENT BUILDINGS; INTERNET OF THINGS; MULTIMEDIA SERVICES; MULTIMEDIA SYSTEMS;

EID: 84921461758     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CNS.2014.6997467     Document Type: Conference Paper
Times cited : (117)

References (30)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey, " Computer networks, vol. 54, no. 15, pp. 2787-2805, 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 2
    • 84876943063 scopus 로고    scopus 로고
    • Internet of things (iot): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of things (iot): A vision, architectural elements, and future directions, " Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 20
    • 80055040638 scopus 로고    scopus 로고
    • Killerbee-practical zigbee exploitation framework
    • J. Wright, "Killerbee-practical zigbee exploitation framework, " in Toorcon11, 2009.
    • (2009) Toorcon11
    • Wright, J.1
  • 22
    • 33845762444 scopus 로고    scopus 로고
    • Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
    • S. Radosavac, A. A. Cárdenas, J. S. Baras, and G. V. Moustakides, "Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers, " Journal of Computer Security, vol. 15, no. 1, pp. 103-128, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.1 , pp. 103-128
    • Radosavac, S.1    Cárdenas, A.A.2    Baras, J.S.3    Moustakides, G.V.4
  • 24
    • 84865658341 scopus 로고    scopus 로고
    • 6lowpan: A study on qos security threats and countermeasures using intrusion detection system approach
    • A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo, "6lowpan: a study on qos security threats and countermeasures using intrusion detection system approach, " International Journal of Communication Systems, vol. 25, no. 9, pp. 1189-1212, 2012.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.9 , pp. 1189-1212
    • Le, A.1    Loo, J.2    Lasebae, A.3    Aiash, M.4    Luo, Y.5
  • 27
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures, " Ad hoc networks, vol. 1, no. 2, pp. 293-315, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 29
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. Wood and J. A. Stankovic, "Denial of service in sensor networks, " Computer, vol. 35, no. 10, pp. 54-62, 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.1    Stankovic, J.A.2
  • 30
    • 84921479575 scopus 로고    scopus 로고
    • "Xmpploit." http://tanguy.ortolo.eu/blog/article69/xmpploit-explained.
    • Xmpploit


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.