메뉴 건너뛰기




Volumn 9, Issue 16, 2016, Pages 3083-3094

SecIoT: a security framework for the Internet of Things

Author keywords

5G; access control; authentication; Internet of Things; risk; security

Indexed keywords

5G MOBILE COMMUNICATION SYSTEMS; ACCESS CONTROL; AUTHENTICATION; COPYRIGHTS; ENVIRONMENTAL MANAGEMENT; NETWORK SECURITY; RISK PERCEPTION; RISKS;

EID: 84929253955     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.1259     Document Type: Article
Times cited : (80)

References (34)
  • 4
    • 84901263621 scopus 로고    scopus 로고
    • Scenarios for 5G mobile and wireless communications: the vision of the METIS project
    • Osseiran A, Boccardi F, Braun V, et al. Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Communications Magazine 2014; 52(5):26–35.
    • (2014) IEEE Communications Magazine , vol.52 , Issue.5 , pp. 26-35
    • Osseiran, A.1    Boccardi, F.2    Braun, V.3
  • 6
    • 79953041521 scopus 로고    scopus 로고
    • Remote patient monitoring within a future 5G infrastructure
    • Oleshchuk V, Fensli R. Remote patient monitoring within a future 5G infrastructure. Wireless Personal Communications 2011; 57(3):431–439.
    • (2011) Wireless Personal Communications , vol.57 , Issue.3 , pp. 431-439
    • Oleshchuk, V.1    Fensli, R.2
  • 11
    • 79951833159 scopus 로고    scopus 로고
    • Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey
    • Nguyen LH, Roscoe AW. Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey. Journal of Computer Security 2011; 19(1):139–201.
    • (2011) Journal of Computer Security , vol.19 , Issue.1 , pp. 139-201
    • Nguyen, L.H.1    Roscoe, A.W.2
  • 13
    • 84876192814 scopus 로고    scopus 로고
    • Human interactive secure key and identity exchange protocols in body sensor networks
    • Huang X, Chen B, Markham A, et al. Human interactive secure key and identity exchange protocols in body sensor networks. IET Information Security 2013; 7(1):30–38.
    • (2013) IET Information Security , vol.7 , Issue.1 , pp. 30-38
    • Huang, X.1    Chen, B.2    Markham, A.3
  • 15
    • 84911881747 scopus 로고    scopus 로고
    • Secure communication with RFID tags in the Internet of Things
    • Dominikus S, Kraxberger S. Secure communication with RFID tags in the Internet of Things. Security and Communication Networks 2014; 7(12):2639–2653.
    • (2014) Security and Communication Networks , vol.7 , Issue.12 , pp. 2639-2653
    • Dominikus, S.1    Kraxberger, S.2
  • 16
    • 84911865485 scopus 로고    scopus 로고
    • Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN
    • Raza S, Duquennoy S, Höglund J, et al. Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN. Security and Communication Networks 2014; 7(12):2654–2668.
    • (2014) Security and Communication Networks , vol.7 , Issue.12 , pp. 2654-2668
    • Raza, S.1    Duquennoy, S.2    Höglund, J.3
  • 17
    • 84911867979 scopus 로고    scopus 로고
    • How to protect security and privacy in the IoT: a policy-based RFID tag management protocol
    • Rekleitis E, Rizomiliotis P, Gritzalis S. How to protect security and privacy in the IoT: a policy-based RFID tag management protocol. Security and Communication Networks 2014; 7(12):2669–2683.
    • (2014) Security and Communication Networks , vol.7 , Issue.12 , pp. 2669-2683
    • Rekleitis, E.1    Rizomiliotis, P.2    Gritzalis, S.3
  • 18
    • 84921717917 scopus 로고    scopus 로고
    • A security authentication scheme in machine-to-machine home network service
    • Sun X, Men S, Zhao C, et al. A security authentication scheme in machine-to-machine home network service. Security and Communication Networks 2012.
    • (2012) Security and Communication Networks
    • Sun, X.1    Men, S.2    Zhao, C.3
  • 19
    • 84992733144 scopus 로고    scopus 로고
    • A privacy enhanced device access protocol for an IoT context
    • Køien GM. A privacy enhanced device access protocol for an IoT context. Security and Communication Networks 2013.
    • (2013) Security and Communication Networks
    • Køien, G.M.1
  • 20
    • 20844435938 scopus 로고    scopus 로고
    • A trust-based context-aware access control model for web-services
    • Bhatti R, Bertino E, Ghafoor A. A trust-based context-aware access control model for web-services. Distributed and Parallel Databases 2005; 18(1):83–105.
    • (2005) Distributed and Parallel Databases , vol.18 , Issue.1 , pp. 83-105
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3
  • 21
    • 48749117730 scopus 로고    scopus 로고
    • Context-aware wireless sensor networks for assisted living and residential monitoring
    • Wood A, Stankovic JA, Virone G, et al. Context-aware wireless sensor networks for assisted living and residential monitoring. IEEE Network 2008; 22(4):26–33.
    • (2008) IEEE Network , vol.22 , Issue.4 , pp. 26-33
    • Wood, A.1    Stankovic, J.A.2    Virone, G.3
  • 24
    • 84884730951 scopus 로고    scopus 로고
    • User-centric secure integration of personal RFID tags and sensor networks
    • Najera P, Roman R, Lopez J. User-centric secure integration of personal RFID tags and sensor networks. Security and Communication Networks 2013; 6(10):1177–1197.
    • (2013) Security and Communication Networks , vol.6 , Issue.10 , pp. 1177-1197
    • Najera, P.1    Roman, R.2    Lopez, J.3
  • 25
    • 84911905537 scopus 로고    scopus 로고
    • Context-aware usage control for web of things
    • Bai G, Yan L, Gu L, et al. Context-aware usage control for web of things. Security and Communication Networks 2014; 7(12):2696–2712.
    • (2014) Security and Communication Networks , vol.7 , Issue.12 , pp. 2696-2712
    • Bai, G.1    Yan, L.2    Gu, L.3
  • 26
    • 84904686666 scopus 로고    scopus 로고
    • Pacemaker hack can deliver deadly 830-volt jolt
    • Kirk J. Pacemaker hack can deliver deadly 830-volt jolt. Computerworld 2012; 17.
    • (2012) Computerworld , vol.17
    • Kirk, J.1
  • 28
    • 24644483295 scopus 로고    scopus 로고
    • Exploiting empirical engagement in authentication protocol design
    • In, Springer, Boppard, Germany
    • Creese S, Goldsmith M, Harrison R, et al. Exploiting empirical engagement in authentication protocol design. In Security in Pervasive Computing. Springer: Boppard, Germany, 2005; 119–133.
    • (2005) Security in Pervasive Computing , pp. 119-133
    • Creese, S.1    Goldsmith, M.2    Harrison, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.