메뉴 건너뛰기




Volumn 20, Issue , 2015, Pages 100-114

A standardized approach to deal with firewall and mobility policies in the IoT

Author keywords

Firewall; Internet of things; Mobile computing; Piggy backing; Product lifecycle management

Indexed keywords

COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; INFORMATION SYSTEMS; INFORMATION USE; LIFE CYCLE; MOBILE COMPUTING; REAL TIME CONTROL;

EID: 84930088817     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2014.09.005     Document Type: Article
Times cited : (42)

References (53)
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito The Internet of things: a survey Comput. Netw. 54 15 2010 2787 2805
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
    • 79960924365 scopus 로고    scopus 로고
    • From wireless sensor networks towards cyber physical systems
    • F. Wu, Y.-F. Kao, and Y.-C. Tseng From wireless sensor networks towards cyber physical systems Pervasive Mob. Comput. 7 4 2011 397 413
    • (2011) Pervasive Mob. Comput. , vol.7 , Issue.4 , pp. 397-413
    • Wu, F.1    Kao, Y.-F.2    Tseng, Y.-C.3
  • 5
    • 58649098157 scopus 로고    scopus 로고
    • RFID in pervasive computing: State-of -The-art and outlook
    • G. Roussos, and V. Kostakos RFID in pervasive computing: state-of-the-art and outlook Pervasive Mob. Comput. 5 1 2009 110 131
    • (2009) Pervasive Mob. Comput. , vol.5 , Issue.1 , pp. 110-131
    • Roussos, G.1    Kostakos, V.2
  • 6
    • 84856105970 scopus 로고    scopus 로고
    • Pervasive computing at scale: Transforming the state of the art
    • D.J. Cook, and S.K. Das Pervasive computing at scale: transforming the state of the art Pervasive Mob. Comput. 8 1 2012 22 35
    • (2012) Pervasive Mob. Comput. , vol.8 , Issue.1 , pp. 22-35
    • Cook, D.J.1    Das, S.K.2
  • 10
    • 79953743773 scopus 로고    scopus 로고
    • Closed-loop PLM for intelligent products in the era of the Internet of things
    • D. Kiritsis Closed-loop PLM for intelligent products in the era of the Internet of things Comput. Aided Des. 43 5 2011 479 501
    • (2011) Comput. Aided Des. , vol.43 , Issue.5 , pp. 479-501
    • Kiritsis, D.1
  • 12
    • 84900826011 scopus 로고    scopus 로고
    • Internet of things for enterprise systems of modern manufacturing
    • Z. Bi, L.D. Xu, and C. Wang Internet of things for enterprise systems of modern manufacturing IEEE Trans. Ind. Inf. 10 2 2014 1537 1546
    • (2014) IEEE Trans. Ind. Inf. , vol.10 , Issue.2 , pp. 1537-1546
    • Bi, Z.1    Xu, L.D.2    Wang, C.3
  • 13
    • 84900809305 scopus 로고    scopus 로고
    • IoT-based configurable information service platform IoT-based configurable information service platform for product lifecycle management
    • H. Cai, L.D. Xu, B. Xu, C. Xie, S. Qin, and L. Jiang IoT-based configurable information service platform IoT-based configurable information service platform for product lifecycle management IEEE Trans. Ind. Inf. 10 2 2014 1558 1567
    • (2014) IEEE Trans. Ind. Inf. , vol.10 , Issue.2 , pp. 1558-1567
    • Cai, H.1    Xu, L.D.2    Xu, B.3    Xie, C.4    Qin, S.5    Jiang, L.6
  • 15
    • 84902550296 scopus 로고    scopus 로고
    • Application delivery in multi-cloud environments using software defined networking
    • S. Paula, R. Jaina, M. Samakab, and J. Pan Application delivery in multi-cloud environments using software defined networking Comput. Netw. 68 2014 166 186
    • (2014) Comput. Netw. , vol.68 , pp. 166-186
    • Paula, S.1    Jaina, R.2    Samakab, M.3    Pan, J.4
  • 19
    • 84901797606 scopus 로고    scopus 로고
    • Sizzle: A standards-based end-to-end security architecture for the embedded Internet
    • A. Norta, P. Grefen, and N.C. Narendra Sizzle: a standards-based end-to-end security architecture for the embedded Internet Data Knowl. Eng. 91 2014 52 89
    • (2014) Data Knowl. Eng. , vol.91 , pp. 52-89
    • Norta, A.1    Grefen, P.2    Narendra, N.C.3
  • 20
    • 84903374627 scopus 로고    scopus 로고
    • Application perspectives for active safety system based on Internet of vehicles
    • L. Chen, Application perspectives for active safety system based on Internet of vehicles, in: Proc. FISITA 2012 World Automotive Congress, 2012, pp. 147-152.
    • (2012) Proc. FISITA 2012 World Automotive Congress , pp. 147-152
    • Chen, L.1
  • 23
    • 84875213753 scopus 로고    scopus 로고
    • Mobile interactions with digital object memories
    • R. Barthel, A. Kröner, and J. Haupert Mobile interactions with digital object memories Pervasive Mob. Comput. 9 2 2013 281 294
    • (2013) Pervasive Mob. Comput. , vol.9 , Issue.2 , pp. 281-294
    • Barthel, R.1    Kröner, A.2    Haupert, J.3
  • 24
    • 71849087957 scopus 로고    scopus 로고
    • Piggy backing on the Web 2.0 Internet: Copyright liability and Web 2.0 mashups
    • L. Veasman Piggy backing on the Web 2.0 Internet: copyright liability and Web 2.0 mashups Hastings Commun. Ent. Law J. 30 2007 311 333
    • (2007) Hastings Commun. Ent. Law J. , vol.30 , pp. 311-333
    • Veasman, L.1
  • 27
    • 84878255100 scopus 로고    scopus 로고
    • The intelligent product in manufacturing control and management
    • D. McFarlane, S. Sarma, J.L. Chirn, and C.Y. Wong The intelligent product in manufacturing control and management J. EAIA 37 1 2013 69 88
    • (2013) J. EAIA , vol.37 , Issue.1 , pp. 69-88
    • McFarlane, D.1    Sarma, S.2    Chirn, J.L.3    Wong, C.Y.4
  • 29
    • 34648828670 scopus 로고    scopus 로고
    • Requirements on unique identifiers for managing product lifecycle information: Comparison of alternative approaches
    • K. Främling, M. Harrison, J. Brusey, and J. Petrow Requirements on unique identifiers for managing product lifecycle information: comparison of alternative approaches Int. J. Comput. Integr. Manuf. 20 7 2007 715 726
    • (2007) Int. J. Comput. Integr. Manuf. , vol.20 , Issue.7 , pp. 715-726
    • Främling, K.1    Harrison, M.2    Brusey, J.3    Petrow, J.4
  • 33
    • 84901427258 scopus 로고    scopus 로고
    • A survey on trust management for Internet of things
    • Z. Yan, P. Zhang, and A.V. Vasilakos A survey on trust management for Internet of things J. Netw. Comput. Appl. 42 2014 120 134
    • (2014) J. Netw. Comput. Appl. , vol.42 , pp. 120-134
    • Yan, Z.1    Zhang, P.2    Vasilakos, A.V.3
  • 34
    • 80052854156 scopus 로고    scopus 로고
    • Securing the Internet of things
    • R. Roman, P. Najera, and J. Lopez Securing the Internet of things Computer 44 9 2011 51 58
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 36
  • 42
    • 84864936980 scopus 로고    scopus 로고
    • Communicating and displaying real-time data with WebSocket
    • V. Pimentel, and B.G. Nickerson Communicating and displaying real-time data with WebSocket IEEE Internet Comput. 16 4 2012 45 53
    • (2012) IEEE Internet Comput. , vol.16 , Issue.4 , pp. 45-53
    • Pimentel, V.1    Nickerson, B.G.2
  • 44
    • 84930085153 scopus 로고    scopus 로고
    • A diversified set of security features for XMPP communication systems useful in cloud computing federation
    • A. Celesti, M. Villari, and A. Puliafito A diversified set of security features for XMPP communication systems useful in cloud computing federation Int. J. Adv. Secur. 6 3-4 2013 99 110
    • (2013) Int. J. Adv. Secur. , vol.6 , Issue.3-4 , pp. 99-110
    • Celesti, A.1    Villari, M.2    Puliafito, A.3
  • 48
    • 84897112043 scopus 로고    scopus 로고
    • Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments
    • C. Bisdikian, C. Gibson, S. Chakraborty, M.B. Srivastava, M. Sensoy, and T.J. Norman Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments Pervasive Mob. Comput. 11 2014 168 187
    • (2014) Pervasive Mob. Comput. , vol.11 , pp. 168-187
    • Bisdikian, C.1    Gibson, C.2    Chakraborty, S.3    Srivastava, M.B.4    Sensoy, M.5    Norman, T.J.6
  • 49
    • 84899412207 scopus 로고    scopus 로고
    • An analytics framework to detect compromised IoT devices using mobility behavior
    • M. Taneja, An analytics framework to detect compromised IoT devices using mobility behavior, in: Proc. International Conference on ICT Convergence, 2013, pp. 38-43.
    • (2013) Proc. International Conference on ICT Convergence , pp. 38-43
    • Taneja, M.1
  • 50
    • 84930091348 scopus 로고    scopus 로고
    • International Organization for Standardization Diagnostics on Controller Area Networks (CAN)
    • International Organization for Standardization, ISO 15765: Road vehicles, Diagnostics on Controller Area Networks (CAN), 2004.
    • (2004) ISO 15765: Road Vehicles
  • 51
    • 84901639831 scopus 로고    scopus 로고
    • Adaptive and context-aware privacy preservation exploiting user interactions in smart environments
    • G. Pallapa, S.K. Das, M. Di Francesco, and T. Aura Adaptive and context-aware privacy preservation exploiting user interactions in smart environments Pervasive Mob. Comput. 12 2014 232 243
    • (2014) Pervasive Mob. Comput. , vol.12 , pp. 232-243
    • Pallapa, G.1    Das, S.K.2    Di Francesco, M.3    Aura, T.4
  • 52
    • 84897112272 scopus 로고    scopus 로고
    • Quality-of-information-aware data collection for mobile sensor networks
    • E.C.-H. Ngai, and P. Gunningberg Quality-of-information-aware data collection for mobile sensor networks Pervasive Mob. Comput. 11 2014 203 215
    • (2014) Pervasive Mob. Comput. , vol.11 , pp. 203-215
    • Ngai, E.C.-H.1    Gunningberg, P.2
  • 53
    • 84866512143 scopus 로고    scopus 로고
    • A survey of context data distribution for mobile ubiquitous systems
    • P. Bellavista, A. Corradi, M. Fanelli, and L. Foschini A survey of context data distribution for mobile ubiquitous systems ACM Comput. Surv. 45 1 2013 1 49
    • (2013) ACM Comput. Surv. , vol.45 , Issue.1 , pp. 1-49
    • Bellavista, P.1    Corradi, A.2    Fanelli, M.3    Foschini, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.