메뉴 건너뛰기




Volumn 104, Issue 5, 2016, Pages 938-946

Using Smart Edge IoT Devices for Safer, Rapid Response with Industry IoT Control Operations

Author keywords

Biometrics; client devices; control systems; Industry 4.0; Internet of Things (IoT); microcomputers; networks; security

Indexed keywords

AUTHENTICATION; BIOMETRICS; CONTROL SYSTEMS; DENIAL-OF-SERVICE ATTACK; GATEWAYS (COMPUTER NETWORKS); INDUSTRY 4.0; INTEROPERABILITY; MAN MACHINE SYSTEMS; MICROCOMPUTERS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; NETWORKS (CIRCUITS);

EID: 84960157592     PISSN: 00189219     EISSN: 15582256     Source Type: Journal    
DOI: 10.1109/JPROC.2015.2513672     Document Type: Article
Times cited : (123)

References (45)
  • 1
    • 84923887174 scopus 로고    scopus 로고
    • Enabling the internet of things
    • Jan.
    • R. Want, B. Schilit, S. Jenson, "Enabling the internet of things," IEEE Computer, vol. 48, no. 1, pp. 28-35, Jan. 2015.
    • (2015) IEEE Computer , vol.48 , Issue.1 , pp. 28-35
    • Want, R.1    Schilit, B.2    Jenson, S.3
  • 2
    • 84964738022 scopus 로고    scopus 로고
    • Lazure, Dec. [Online]. Available
    • N. Sandor, "Wind River: Intel's core technology provider or IoT," Lazure, Dec. 2013. [Online]. Available: https://lazure2.wordpress.com/2014/12/10/windriver-intels-core-technology-provider-for-iot/
    • (2013) Wind River: Intel's Core Technology Provider or IoT
    • Sandor, N.1
  • 3
    • 84964745323 scopus 로고    scopus 로고
    • Wind River Alameda, CA [Online]. Available
    • Wind River, "Transforming brownfield to greenfield in the Internet of Thing," Alameda, CA, 2015. [Online]. Available: http://www.windriver.com/whitepapers/brownfield-to-greenfield-iot/2142-Brownfield-and-Greenfield-Damisch-IoT-Article.pdf
    • (2015) Transforming Brownfield to Greenfield in the Internet of Thing
  • 4
  • 10
  • 11
    • 84893261644 scopus 로고    scopus 로고
    • Trend Micro, Irving, TX, USA [Online]. Available
    • K. Wilhoit, "Who's really attacking your ICS equipment?" Trend Micro, Irving, TX, USA, 2013. [Online]. Available: http://www. trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-whosreally-attacking-your-ics-equipment.pdf
    • (2013) Who's Really Attacking Your ICS Equipment?
    • Wilhoit, K.1
  • 12
    • 77951006536 scopus 로고    scopus 로고
    • NSTC Subcommittee on Biometrics Sep. [Online]. Available
    • NSTC Subcommittee on Biometrics, Sep. 2006, Biometrics Frequently Asked Questions. [Online]. Available: http://biometrics.gov/Documents/FAQ.pdf
    • (2006) Biometrics Frequently Asked Questions
  • 13
    • 84964751279 scopus 로고    scopus 로고
    • M. Tech Scholar, Nov. [Online]. Available
    • S. Basishtha and S. Boruah, "Biometric authentication techniques," M. Tech Scholar, Nov. 2013. [Online]. Available: http://www. slideshare.net/sububasistha/a-study-onbiometric-authentication-techniques? related=1
    • (2013) Biometric Authentication Techniques
    • Basishtha, S.1    Boruah, S.2
  • 14
  • 15
    • 84873449398 scopus 로고    scopus 로고
    • NIST Special Publication 800-118 Apr. [Online]. Available
    • K. Scarfone and M. Souppaya, "Guide to enterprise password management," NIST Special Publication 800-118, Apr. 2009. [Online]. Available: http://csrc.nist. gov/publications/drafts/800-118/draft-sp800-118.pdf
    • (2009) Guide to Enterprise Password Management
    • Scarfone, K.1    Souppaya, M.2
  • 17
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: Issues and challenges
    • Jun.
    • U. Uludag, S. Pankanti, S. Prabhakar, A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, Jun. 2004.
    • (2004) Proc IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.K.4
  • 18
    • 84964772770 scopus 로고    scopus 로고
    • PBWorks [Online] Available
    • PBWorks, "Biometrics: Advantages and disadvantages of technologies," 2003. [Online]. Available: http://biometrics. pbworks.com/w/page/14811349/Advantages% 20and%20disadvantages%20of% 20technologies
    • (2003) Biometrics: Advantages and Disadvantages of Technologies
  • 19
    • 84900525490 scopus 로고    scopus 로고
    • Chaos Computer Club Sep. 21 [Online]. Available
    • Chaos Computer Club, "Chaos computer club breaks Apple TouchID," Sep. 21, 2013. [Online]. Available: http://www.ccc.de/en/updates/2013/ccc-breaks-apple-touchid
    • (2013) Chaos Computer Club Breaks Apple TouchID
  • 22
    • 84856097710 scopus 로고    scopus 로고
    • Black Hat Briefings [Online]. Available
    • N. M. Duc and B. Q. Minh, "Your face is NOT your password," Black Hat Briefings, 2009. [Online]. Available: https://www. blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-notyour-password.pdf
    • (2009) Your Face Is NOT Your Password
    • Duc, N.M.1    Minh, B.Q.2
  • 23
    • 84964734312 scopus 로고    scopus 로고
    • Face recognition security, even with a 'Blink Test', is easy to trick
    • Mar. 15 [Online]. Available
    • D. Moren, "Face recognition security, even with a 'Blink Test', is easy to trick," Popular Sci., Mar. 15, 2015. [Online]. Available: http://www.popsci.com/its-not-hard-trickfacial-recognition-security
    • (2015) Popular Sci.
    • Moren, D.1
  • 24
    • 70450225439 scopus 로고    scopus 로고
    • Biometric hash generation and user authentication based on handwriting using secure sketches
    • T. Scheidat, C. Vielhauer, J. Dittmann, "Biometric hash generation and user authentication based on handwriting using secure sketches," in Proc. Int. Symp. Image Signal Process. Anal., 2009, pp. 89-94.
    • (2009) Proc. Int. Symp. Image Signal Process. Anal. , pp. 89-94
    • Scheidat, T.1    Vielhauer, C.2    Dittmann, J.3
  • 25
    • 84897448940 scopus 로고    scopus 로고
    • Secure cloud-based biometric authentication utilizing smart devices for electronic transactions
    • [Online]. Available
    • B. L. Tait, "Secure cloud-based biometric authentication utilizing smart devices for electronic transactions," Int. J. Electron. Security Digital Forens., vol. 6, no. 1, 2014. [Online]. Available: http://www. inderscienceonline.com/doi/pdf/10.1504/IJESDF.2014.060170
    • (2014) Int. J. Electron. Security Digital Forens. , vol.6 , Issue.1
    • Tait, B.L.1
  • 26
    • 67650239548 scopus 로고    scopus 로고
    • Fake fingers in fingerprint recognition: Glycerin supersedes gelatin
    • C. Barral and A. Tria, "Fake fingers in fingerprint recognition: Glycerin supersedes gelatin," Formal to Practical Security, pp. 57-69, 2008.
    • (2008) Formal to Practical Security , pp. 57-69
    • Barral, C.1    Tria, A.2
  • 27
    • 84964738014 scopus 로고    scopus 로고
    • The Associated Press HuffPost Green, May 29 [Online]. Available
    • The Associated Press, "California oil spill grows to 9 miles along coast," HuffPost Green, May 29, 2015. [Online]. Available: http://www.huffingtonpost.com/2015/05/20/california-oil-spill-n-7344940.html
    • (2015) California Oil Spill Grows to 9 Miles Along Coast
  • 29
    • 84919476322 scopus 로고    scopus 로고
    • An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks
    • Dec.
    • H. Sedjelmaci, S. M. Senouci, M. A. Abu-Rgheff, "An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks," Internet of Things J., vol. 1, no. 6, pp. 570-577, Dec. 2014.
    • (2014) Internet of Things J. , vol.1 , Issue.6 , pp. 570-577
    • Sedjelmaci, H.1    Senouci, S.M.2    Abu-Rgheff, M.A.3
  • 31
    • 84897140054 scopus 로고    scopus 로고
    • Design and analysis of a highly user-friendly, secure, privacy-preserving, revocable authentication method
    • Apr.
    • Y. Sui, X. Zou, E. Du, F. Li, "Design and analysis of a highly user-friendly, secure, privacy-preserving, revocable authentication method," IEEE Trans. Comput., vol. 63, no. 4, pp. 902-216, Apr. 2014.
    • (2014) IEEE Trans. Comput. , vol.63 , Issue.4 , pp. 902-1216
    • Sui, Y.1    Zou, X.2    Du, E.3    Li, F.4
  • 34
    • 84964794577 scopus 로고    scopus 로고
    • Intel Corp. RealSense Santa Clara, CA, USA. [Online]. Available
    • Intel Corp., "RealSense," Santa Clara, CA, USA. [Online]. Available: http://www.intel. com/content/www/us/en/architecture-andtechnology/realsense-overview.html
  • 35
    • 84964699215 scopus 로고    scopus 로고
    • ARM, TrustZone San Jose, CA, USA [Online]. Available
    • ARM, "TrustZone," San Jose, CA, USA, 2015. [Online]. Available: http://www.arm. com/products/processors/technologies/trustzone/index.php
    • (2015)
  • 37
    • 79952958289 scopus 로고    scopus 로고
    • Practical eaves dropping and skimming attacks on high-frequency RFID tokens
    • Mar. 14
    • G. P. Hancke, "Practical eaves dropping and skimming attacks on high-frequency RFID tokens," J. Comput. Security, vol. 19, no. 2, pp. 259-288, Mar. 14, 2011.
    • (2011) J. Comput. Security , vol.19 , Issue.2 , pp. 259-288
    • Hancke, G.P.1
  • 39
    • 70350096381 scopus 로고    scopus 로고
    • Biometrically based electronic signatures for a public networked environment
    • London, U.K Sep. 1-2
    • B. Tait and B. Von Solms, "Biometrically based electronic signatures for a public networked environment," in Proc. 5th Int. Conf. ICGS3, London, U.K., Sep. 1-2, 2009, pp. 174-182.
    • (2009) Proc. 5th Int. Conf. ICGS3 , pp. 174-182
    • Tait, B.1    Von Solms, B.2
  • 40
    • 84945129714 scopus 로고    scopus 로고
    • A multi-factor security protocol for wireless payment-Secure web authentication using mobile devices
    • Salamanca, Spain, Nov.
    • A. Tiwari, S. Sanyal, A. Abraham, "A multi-factor security protocol for wireless payment-Secure web authentication using mobile devices," in Proc. IADIS Int. Conf. Appl. Comput., Salamanca, Spain, Nov. 2011, pp. 18-20.
    • (2011) Proc. IADIS Int. Conf. Appl. Comput. , pp. 18-20
    • Tiwari, A.1    Sanyal, S.2    Abraham, A.3
  • 44
    • 84964719919 scopus 로고    scopus 로고
    • Intel Corp [Online]. Available
    • Intel Corp., "The Internet of Things (IoT) starts with Intel inside," 2015. [Online]. Available: http://www.intel.com/content/www/us/en/internet-of-things/overview.html
    • (2015) The Internet of Things (IoT) Starts with Intel Inside
  • 45
    • 84964728666 scopus 로고    scopus 로고
    • Intel Corp [Online]. Available
    • Intel Corp., "Internet of Things products and solutions," 2015. [Online]. Available: http://www.intel.com/content/www/us/en/internet-of-things/products-and-solutions.html
    • (2015) Internet of Things Products and Solutions


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.