메뉴 건너뛰기




Volumn , Issue , 2015, Pages 247-252

Internet of Things - A study on the security challenges

Author keywords

Internet of Things; security in IOT

Indexed keywords

MIDDLEWARE;

EID: 84941985475     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IADCC.2015.7154707     Document Type: Conference Paper
Times cited : (25)

References (29)
  • 1
    • 84900823317 scopus 로고    scopus 로고
    • QoS-aware scheduling of services-oriented internet of things
    • May
    • Ling Li et al., "QoS-Aware Scheduling of Services-Oriented Internet of Things, " Industrial Informatics, IEEE Transactions, vol. lO, no. 2, pp. 1497, 1505, May 2014 doi: 10. 11 09/TII. 20 14. 2306782
    • (2014) Industrial Informatics, IEEE Transactions , vol.10 , Issue.2 , pp. 1497-1505
    • Ling, L.1
  • 2
    • 84941979944 scopus 로고    scopus 로고
    • RFID, (2014), Available: Atlasrfid. comljovix-educationlauto-idbasics/ acti ve-rfid-vs-passi ve-rfid
    • RFID, (2014), Available: Atlasrfid. comljovix-educationlauto-idbasics/ acti ve-rfid-vs-passi ve-rfid.
  • 3
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • LF. Akyildiz, W. Su et al., in "Wireless sensor networks: A survey", Computer Networks 38 (4) (2002) 393-422
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, L.F.1    Su, W.2
  • 4
    • 84941979945 scopus 로고    scopus 로고
    • IEEE 802. 15, Available: Ieee802. org/15
    • IEEE 802. 15, Available: Ieee802. org/15
  • 8
    • 79956345109 scopus 로고    scopus 로고
    • Browsing the internet of things with sentient visors
    • May
    • Garcia-Macias et al., "Browsing the Internet of Things with Sentient Visors, " Computer, vo1. 44, no. 5, ppA6, 52, May 2011 doi: 10. 1109/MC. 2011. 128
    • (2011) Computer , vol.44 , Issue.5 , pp. A6-52
    • Garcia-Macias1
  • 9
    • 78751700704 scopus 로고    scopus 로고
    • A real-time search engine for the Web of Things
    • Nov. 29 201O-Dec. I 2010
    • Ostermaier, B et al., "A real-time search engine for the Web of Things, " Internet of Things (lOT), 2010, vol., no., pp. l, 8, Nov. 29 201O-Dec. I 2010 doi: 10. 1109/IOT. 2010. 5678450
    • (2010) Internet of Things (LOT) , pp. 1-8
    • Ostermaier, B.1
  • 11
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • 28 October
    • Luigi Atzoria, Antonio Ierab, Giacomo Morabito, "The Internet of Things: A survey", Elsevier Volume 54, Issue 15, 28 October 2010
    • (2010) Elsevier , vol.54 , Issue.15
    • Atzoria, L.1    Ierab, A.2    Morabito, G.3
  • 13
    • 84871365378 scopus 로고    scopus 로고
    • A group key distribution scheme for wireless sensor networks in the internet of things scenario
    • Article ID
    • Hong Yu et al., "A Group Key Distribution Scheme for Wireless Sensor Networks in the Internet of Things Scenario", International Journal of Distributed Sensor Networks Volume 2012, Article ID 813594, 12 pages doi: Dx. doi. orgll0. 115512012/813594
    • International Journal of Distributed Sensor Networks , vol.2012
    • Yu, H.1
  • 14
    • 84941963822 scopus 로고    scopus 로고
    • Research on security issues of the internet of things
    • Chen Qiang et al., "Research on Security Issues of the Internet of Things", International Journal of Future Generation Communication and Networking Vo1. 6, No. 6 (2013), pp. l-1O doi: Dx. doi. orgll 0. 14257/ijfgcn. 20 13. 6. 6. 0 1
    • (2013) International Journal of Future Generation Communication and Networking , vol.6 , Issue.6 , pp. 1-10
    • Qiang, C.1
  • 15
    • 84925380945 scopus 로고    scopus 로고
    • Research on the smart wireless sensor perception system and its application based on Internet of Things
    • 2014 (Dec 2014)
    • Zhang Yongheng, Zhang Feng, "Research on the smart wireless sensor perception system and its application based on Internet of Things", computer modelling & new technologies 2014 18(1) 44-51 2014 (Dec 2014) Available: Tsi. lv
    • (2014) Computer Modelling & New Technologies , vol.18 , Issue.1 , pp. 44-51
    • Yongheng, Z.1    Feng, Z.2
  • 17
    • 84904472157 scopus 로고    scopus 로고
    • A groupbased security protocol for machine type communications in LTE-advanced
    • April 27 2014-May 2
    • Daesung Choi; Sungdae Hong; Hyoung-Kee Choi, "A groupbased security protocol for Machine Type Communications in LTE-Advanced, " Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on, vol., no., pp. 161, 162, April 27 2014-May 2 2014 doi: 10. 1109/INFCOMW. 2014. 6849205
    • (2014) Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on , pp. 161-162
    • Choi, D.1    Hong, S.2    Choi, H.3
  • 22
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • S. Vaudenay, "Secure communications over insecure channels based on short authenticated strings", Advances in Cryptology-CRYPTO 2005 Lecture Notes in Computer Science Volume 3621, 2005, pp 309-326 doi: Dx. doi. orgIl0. 10071l153521819
    • (2005) Advances in Cryptology-CRYPTO 2005 Lecture Notes in Computer Science , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 23
    • 61849184822 scopus 로고    scopus 로고
    • Using audio in secure device pairing
    • February
    • Michael T. Goodrich et al. "Using audio in secure device pairing" International Journal of Security and Networks archive Volume 4 Issue 1/2, February 2009 Pages 57-68 doi: I 0. 1504/IJSN. 2009. 023426.
    • (2009) International Journal of Security and Networks Archive , vol.4 , Issue.1-2 , pp. 57-68
    • Michael, T.G.1
  • 25
    • 84883730840 scopus 로고    scopus 로고
    • Batch-based group key management with shared key derivation in the Internet of Things
    • 1-5 July
    • Veltri L et al., "Batch-based group key management with shared key derivation in the Internet of Things, " Wireless Communications and Mobile Computing Conference (lWCMC), 2013 9th International, vol., no., pp. 1688, 1693, 1-5 July 2013 doi: 10. 11 09/IWCMC. 20 13. 658381 0
    • (2013) Wireless Communications and Mobile Computing Conference (LWCMC), 2013 9th International , pp. 1688-1693
    • Veltri, L.1
  • 27
    • 84921461758 scopus 로고    scopus 로고
    • Securing smart home: Technologies, security challenges, and security requirements
    • 29-31 Oct.
    • Changmin Lee et etl., "Securing smart home: Technologies, security challenges, and security requirements, " Communications and Network Security (CNS), 2014 IEEE Conference on, vol., no., pp. 67, n, 29-31 Oct. 2014 doi: 10. 1109/CNS. 2014. 6997467
    • (2014) Communications and Network Security (CNS), 2014 IEEE Conference on , pp. 67
    • Lee Et Etl, C.1
  • 28
    • 72949104155 scopus 로고    scopus 로고
    • A survey on jamming attacks and countermeasures in wsns
    • A. Mpitziopoulos et al., "A survey on jamming attacks and countermeasures in wsns" Communications Surveys & Tutorials, IEEE, vol. 11, no. 4, pp. 42-56, 2009
    • (2009) Communications Surveys & Tutorials, IEEE , vol.11 , Issue.4 , pp. 42-56
    • Mpitziopoulos, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.