메뉴 건너뛰기




Volumn 26, Issue 2, 2016, Pages 337-359

The Internet of Things: a security point of view

Author keywords

Internet of Things; Multi layer security architecture; Security requirements

Indexed keywords


EID: 84961579337     PISSN: 10662243     EISSN: None     Source Type: Journal    
DOI: 10.1108/IntR-07-2014-0173     Document Type: Article
Times cited : (210)

References (68)
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: a survey
    • “”
    • Atzori, L., Iera, A. and Morabito, G. (2010), “The Internet of Things: a survey”, Computer Networks, Vol. 54 No. 15, pp. 2787-2805.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
    • 84866034380 scopus 로고    scopus 로고
    • The Social Internet of Things (SIoT) – when social networks meet the Internet of Things: concept, architecture and network characterization
    • “”
    • Atzori, L., Iera, A., Morabito, G. and Nitti, M. (2012), “The Social Internet of Things (SIoT) – when social networks meet the Internet of Things: concept, architecture and network characterization”, Computer Networks, Vol. 56 No. 16, pp. 3594-3608.
    • (2012) Computer Networks , vol.56 , Issue.16 , pp. 3594-3608
    • Atzori, L.1    Iera, A.2    Morabito, G.3    Nitti, M.4
  • 4
    • 84961591745 scopus 로고    scopus 로고
    • “Internet of Things, SCADA, Ipv6 social networking”, :(accessed 14 December 2013)
    • Bamforth, R. (2014), “Internet of Things, SCADA, Ipv6 and social networking”, available at: www.it-director.com/business/innovation/content.php?cid=14590 (accessed 14 December 2013).
    • (2014)
    • Bamforth, R.1
  • 5
    • 84900826011 scopus 로고    scopus 로고
    • Internet of Things for enterprise systems of modern manufacturing
    • “”
    • Bi, Z., Xu, L. and Wang, C. (2014), “Internet of Things for enterprise systems of modern manufacturing”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1537-1546.
    • (2014) IEEE Transactions on Industrial Informatics , vol.10 , Issue.2 , pp. 1537-1546
    • Bi, Z.1    Xu, L.2    Wang, C.3
  • 6
    • 39649090052 scopus 로고    scopus 로고
    • Economical assessment of the impact of RFID technology and EPC system on the fast-moving consumer goods supply chain
    • “”
    • Bottani, E. and Rizzi, A. (2008), “Economical assessment of the impact of RFID technology and EPC system on the fast-moving consumer goods supply chain”, International Journal of Production Economics, Vol. 112 No. 2, pp. 548-569.
    • (2008) International Journal of Production Economics , vol.112 , Issue.2 , pp. 548-569
    • Bottani, E.1    Rizzi, A.2
  • 8
    • 84900809305 scopus 로고    scopus 로고
    • Iot-based configurable information service platform for product lifecycle management
    • “”
    • Cai, H., Xu, L., Xu, B., Xie, C., Qin, S. and Jiang, L. (2014), “Iot-based configurable information service platform for product lifecycle management”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1558-1567.
    • (2014) IEEE Transactions on Industrial Informatics , vol.10 , Issue.2 , pp. 1558-1567
    • Cai, H.1    Xu, L.2    Xu, B.3    Xie, C.4    Qin, S.5    Jiang, L.6
  • 9
    • 84961591733 scopus 로고    scopus 로고
    • “Security requirements of Internet of Things”, :101-2012 Security Requirements of Internet of Things.pdf (accessed 1 March 2016)
    • CCSA (2012), “Security requirements of Internet of Things”, available at: ftp://ftp.onem2m.org/Pool/CCSA/YDB 101-2012 Security Requirements of Internet of Things.pdf (accessed 1 March 2016).
    • (2012)
  • 11
    • 84867806916 scopus 로고    scopus 로고
    • A general distributed consensus algorithm for wireless sensor networks
    • “” London:
    • Choi, J., Li, S., Wang, X. and Ha, J. (2012), “A general distributed consensus algorithm for wireless sensor networks”, Wireless Advanced (WiAd), London, pp. 16-21.
    • (2012) Wireless Advanced (WiAd) , pp. 16-21
    • Choi, J.1    Li, S.2    Wang, X.3    Ha, J.4
  • 13
    • 84961604189 scopus 로고    scopus 로고
    • Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 Mhz-960 Mhz Version 1.0.9
    • “” , , :
    • EPCglobal (2004), “Radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 Mhz-960 Mhz Version 1.0.9”, Computer Communications, Vol. 51, pp. 1-20, available at: www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_0_9-standard-20050126.pdf
    • (2004) Computer Communications , vol.51 , pp. 1-20
    • EPCglobal, E.1
  • 14
    • 84961602174 scopus 로고    scopus 로고
    • “IT-security: Weblogic Server Oracle Platform Security Services (OPSS)”, :/ (accessed 5 July)
    • Esad-Djou, M. (2014), “IT-security: Weblogic Server and Oracle Platform Security Services (OPSS)”, available at: http://thecattlecrew.wordpress.com/2014/02/17/it-security-weblogic-server_1/ (accessed 5 July).
    • (2014)
    • Esad-Djou, M.1
  • 16
    • 85008059050 scopus 로고    scopus 로고
    • RFID application development with the accada middleware platform
    • “”
    • Floerkemeier, C., Roduner, C. and Lampe, M. (2007), “RFID application development with the accada middleware platform”, IEEE Systems Journal, Vol. 1 No. 2, pp. 82-94.
    • (2007) IEEE Systems Journal , vol.1 , Issue.2 , pp. 82-94
    • Floerkemeier, C.1    Roduner, C.2    Lampe, M.3
  • 18
    • 34547950128 scopus 로고    scopus 로고
    • Making security usable: are things improving?
    • “”
    • Furnell, S. (2007), “Making security usable: are things improving?”, Computers & Security, Vol. 26 No. 6, pp. 434-443.
    • (2007) Computers & Security , vol.26 , Issue.6 , pp. 434-443
    • Furnell, S.1
  • 19
    • 84856448398 scopus 로고    scopus 로고
    • Combining heterogeneous service technologies for building an Internet of Things middleware
    • “”
    • Gama, K., Touseau, L. and Donsez, D. (2012), “Combining heterogeneous service technologies for building an Internet of Things middleware”, Computer Communications, Vol. 35 No. 4, pp. 405-417.
    • (2012) Computer Communications , vol.35 , Issue.4 , pp. 405-417
    • Gama, K.1    Touseau, L.2    Donsez, D.3
  • 20
    • 84961628404 scopus 로고    scopus 로고
    • “Internet of Things: thinking services”, :(accessed 5 July 2014)
    • Gaur, H. (2013), “Internet of Things: thinking services”, available at: https://blogs.oracle.com/IOT/entry/internet_of_things_thinking_services (accessed 5 July 2014).
    • (2013)
    • Gaur, H.1
  • 21
    • 84902106352 scopus 로고    scopus 로고
    • Trust management mechanism for Internet of Things
    • “”
    • Gu, L., Wang, J. and Sun, B. (2014), “Trust management mechanism for Internet of Things”, China Communications, Vol. 11 No. 2, pp. 148-156.
    • (2014) China Communications , vol.11 , Issue.2 , pp. 148-156
    • Gu, L.1    Wang, J.2    Sun, B.3
  • 22
    • 77956394831 scopus 로고    scopus 로고
    • Interacting with the SOA-based Internet of Things: discovery, query, selection, and on-demand provisioning of web services
    • “”
    • Guinard, D., Trifa, V., Karnouskos, S., Spiess, P. and Savio, D. (2010), “Interacting with the SOA-based Internet of Things: discovery, query, selection, and on-demand provisioning of web services”, IEEE Transactions on Services Computing, Vol. 3 No. 3, pp. 223-235.
    • (2010) IEEE Transactions on Services Computing , vol.3 , Issue.3 , pp. 223-235
    • Guinard, D.1    Trifa, V.2    Karnouskos, S.3    Spiess, P.4    Savio, D.5
  • 23
    • 84898426599 scopus 로고    scopus 로고
    • Integration of distributed enterprise applications: a survey
    • “”
    • He, W., Xu, L. and Li, S. (2012), “Integration of distributed enterprise applications: a survey”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 1, pp. 35-42.
    • (2012) IEEE Transactions on Industrial Informatics , vol.10 , Issue.1 , pp. 35-42
    • He, W.1    Xu, L.2    Li, S.3
  • 24
    • 33845338757 scopus 로고    scopus 로고
    • The impact of enterprise systems on corporate performance: a study of ERP, SCM, and CRM system implementations
    • “”
    • Hendricks, K.B., Singhal, V.R. and Stratman, J.K. (2007), “The impact of enterprise systems on corporate performance: a study of ERP, SCM, and CRM system implementations”, Journal of Operations Management, Vol. 25 No. 1, pp. 65-82.
    • (2007) Journal of Operations Management , vol.25 , Issue.1 , pp. 65-82
    • Hendricks, K.B.1    Singhal, V.R.2    Stratman, J.K.3
  • 25
    • 35148881036 scopus 로고    scopus 로고
    • Harvesting Wiki consensus: using Wikipedia entries as vocabulary for knowledge management
    • “”
    • Hepp, M., Siorpaes, K. and Bachlechner, D. (2007), “Harvesting Wiki consensus: using Wikipedia entries as vocabulary for knowledge management”, IEEE Internet Computing, Vol. 11 No. 5, pp. 54-65.
    • (2007) IEEE Internet Computing , vol.11 , Issue.5 , pp. 54-65
    • Hepp, M.1    Siorpaes, K.2    Bachlechner, D.3
  • 26
    • 84961628281 scopus 로고    scopus 로고
    • “Cryptanalysis of the SASI ultra-light weight RFID authentication protocol”, ArXiv, :(accessed 20 May)
    • Hernandez-Castro, J.C., Tapiador, J.M.E., Peris-Lopez, P., Li, T. and Quisquater, J.-J. (2013), “Cryptanalysis of the SASI ultra-light weight RFID authentication protocol”, ArXiv, available at: http://arxiv.org/abs/0811.4257 (accessed 20 May).
    • (2013)
    • Hernandez-Castro, J.C.1    Tapiador, J.M.E.2    Peris-Lopez, P.3    Li, T.4    Quisquater, J.-J.5
  • 27
    • 0036608181 scopus 로고    scopus 로고
    • Investment in enterprise resource planning: business impact and productivity measures
    • “”
    • Hitt, L.M., Wu, D. and Zhou, X. (2002), “Investment in enterprise resource planning: business impact and productivity measures”, Journal of Management Information Systems, Vol. 19 No. 1, pp. 71-98.
    • (2002) Journal of Management Information Systems , vol.19 , Issue.1 , pp. 71-98
    • Hitt, L.M.1    Wu, D.2    Zhou, X.3
  • 28
    • 84992733730 scopus 로고    scopus 로고
    • The RQ-tech methodology: a new paradigm for conceptualizing strategic enterprise architectures
    • “”
    • Hoyland, C.A., Adams, K.M., Tolk, A. and Xu, L.D. (2014), “The RQ-tech methodology: a new paradigm for conceptualizing strategic enterprise architectures”, Journal of Management Analytics, Vol. 1 No. 1, pp. 55-77.
    • (2014) Journal of Management Analytics , vol.1 , Issue.1 , pp. 55-77
    • Hoyland, C.A.1    Adams, K.M.2    Tolk, A.3    Xu, L.D.4
  • 29
    • 84961638028 scopus 로고    scopus 로고
    • “Internet of Things research study”, :(accessed 5 September)
    • HP Company (2014), “Internet of Things research study”, available at: http://h30499.www3.hp.com/hpeb/attachments/hpeb/application-security-fortify-on-demand/189/1/HP_IoT_Research_Study.pdf (accessed 5 September).
    • (2014)
  • 30
    • 84961602765 scopus 로고    scopus 로고
    • “The Internet of Things, International Telecommunication Union (ITU) Internet Report”,London:
    • ITU (2013), “The Internet of Things, International Telecommunication Union (ITU) Internet Report”, London.
    • (2013)
  • 31
    • 84900810686 scopus 로고    scopus 로고
    • An interactive trust model for application market of the Internet of Things
    • “”
    • Kang, K., Pang, Z., Da Xu, L., Ma, L. and Wang, C. (2014), “An interactive trust model for application market of the Internet of Things”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1516-1526.
    • (2014) IEEE Transactions on Industrial Informatics , vol.10 , Issue.2 , pp. 1516-1526
    • Kang, K.1    Pang, Z.2    Da Xu, L.3    Ma, L.4    Wang, C.5
  • 32
    • 84919978090 scopus 로고    scopus 로고
    • Securing the Internet of Things: a standardization perspective
    • “”
    • Keoh, S., Kumar, S. and Tschofenig, H. (2014), “Securing the Internet of Things: a standardization perspective”, IEEE Internet of Things Journal, Vol. 1 No. 3, pp. 265-275.
    • (2014) IEEE Internet of Things Journal , vol.1 , Issue.3 , pp. 265-275
    • Keoh, S.1    Kumar, S.2    Tschofenig, H.3
  • 33
    • 84871397265 scopus 로고    scopus 로고
    • Security and vulnerability of SCADA systems over IP-based wireless sensor networks
    • “” , Article ID 268478,10.1155/2012/268478
    • Kim, H. (2012), “Security and vulnerability of SCADA systems over IP-based wireless sensor networks”, International Journal of Distributed Sensor Networks, Vol. 2012, Article ID 268478, pp. 1-10. doi: 10.1155/2012/268478.
    • (2012) International Journal of Distributed Sensor Networks , vol.2012 , pp. 1-10
    • Kim, H.1
  • 34
    • 84961591722 scopus 로고    scopus 로고
    • “The Internet of Things,”(versión electrónica), :& hl=en
    • Kranenburg, R.V., Anzelmo, E., Bassi, A., Caprio, D., Dodson, S. and Ratto, M. (2011), “The Internet of Things,” 1st Berlin Symposium on Internet and Society (versión electrónica), available at: http://scholar.google.com/citations?user=oEr_DWAAAAAJ & hl=en
    • (2011)
    • Kranenburg, R.V.1    Anzelmo, E.2    Bassi, A.3    Caprio, D.4    Dodson, S.5    Ratto, M.6
  • 35
    • 81255151151 scopus 로고    scopus 로고
    • Enterprise systems: state-of-the-art and future trends
    • “”
    • Li, D.X. (2011), “Enterprise systems: state-of-the-art and future trends”, IEEE Transactions on Industrial Informatics, Vol. 7 No. 4, pp. 630-640.
    • (2011) IEEE Transactions on Industrial Informatics , vol.7 , Issue.4 , pp. 630-640
    • Li, D.X.1
  • 36
    • 84883394343 scopus 로고    scopus 로고
    • Practical secure communication for integrating wireless sensor networks into the Internet of Things
    • “”
    • Li, F. and Xiong, P. (2013), “Practical secure communication for integrating wireless sensor networks into the Internet of Things”, IEEE Sensors Journal, Vol. 13 No. 10, pp. 3677-3684.
    • (2013) IEEE Sensors Journal , vol.13 , Issue.10 , pp. 3677-3684
    • Li, F.1    Xiong, P.2
  • 37
    • 84900823317 scopus 로고    scopus 로고
    • QoS-aware scheduling of services-oriented Internet of Things
    • a), “”
    • Li, L., Li, S. and Zhao, S. (2014a), “QoS-aware scheduling of services-oriented Internet of Things”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1497-1505.
    • (2014) IEEE Transactions on Industrial Informatics , vol.10 , Issue.2 , pp. 1497-1505
    • Li, L.1    Li, S.2    Zhao, S.3
  • 38
    • 85019590394 scopus 로고    scopus 로고
    • An emergency resource allocation model for maritime chemical spill accidents
    • b), “”
    • Li, L., Wang, B. and Wang, A. (2014b), “An emergency resource allocation model for maritime chemical spill accidents”, Journal of Management Analytics, Vol. 1 No. 1, pp. 1-10.
    • (2014) Journal of Management Analytics , vol.1 , Issue.1 , pp. 1-10
    • Li, L.1    Wang, B.2    Wang, A.3
  • 39
    • 84925468156 scopus 로고    scopus 로고
    • The Internet of Things: a survey
    • c), “”
    • Li, S., Da Xu, L. and Zhao, S. (2014c), “The Internet of Things: a survey”, Information Systems Frontiers, Vol. 17 No. 2, pp. 243-259.
    • (2014) Information Systems Frontiers , vol.17 , Issue.2 , pp. 243-259
    • Li, S.1    Da Xu, L.2    Zhao, S.3
  • 41
    • 84880920418 scopus 로고    scopus 로고
    • RFID in the warehouse: a literature analysis (1995-2010) of its applications, benefits, challenges and future trends
    • “”
    • Lim, M.K., Bahr, W. and Leung, S.C. (2013), “RFID in the warehouse: a literature analysis (1995-2010) of its applications, benefits, challenges and future trends”, International Journal of Production Economics, Vol. 145 No. 1, pp. 409-430.
    • (2013) International Journal of Production Economics , vol.145 , Issue.1 , pp. 409-430
    • Lim, M.K.1    Bahr, W.2    Leung, S.C.3
  • 42
    • 84861997111 scopus 로고    scopus 로고
    • Internet of Things: vision, applications and research challenges
    • “”
    • Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I. (2012), “Internet of Things: vision, applications and research challenges”, Ad Hoc Networks, Vol. 10 No. 7, pp. 1497-1516.
    • (2012) Ad Hoc Networks , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 43
    • 84961668999 scopus 로고    scopus 로고
    • “Disruptive civil technologies: six technologies with potential impacts on US interests out to 2025”, conference report
    • National Intelligence Council (2008), “Disruptive civil technologies: six technologies with potential impacts on US interests out to 2025”, conference report.
    • (2008)
    • National Intelligence Council, N.I.C.1
  • 45
    • 84876156481 scopus 로고    scopus 로고
    • Cyberentity security in the Internet of Things
    • “”
    • Ning, H., Liu, H. and Yang, L.T. (2013), “Cyberentity security in the Internet of Things”, Computer, Vol. 46 No. 4, pp. 0046-0053.
    • (2013) Computer , vol.46 , Issue.4 , pp. 0046-0053
    • Ning, H.1    Liu, H.2    Yang, L.T.3
  • 46
    • 80052863388 scopus 로고    scopus 로고
    • Security and privacy in an online world
    • “”
    • Oppliger, R. (2011), “Security and privacy in an online world”, Computer, Vol. 44 No. 9, pp. 21-22.
    • (2011) Computer , vol.44 , Issue.9 , pp. 21-22
    • Oppliger, R.1
  • 48
    • 84961669010 scopus 로고    scopus 로고
    • “Security 101: securing SCADA environments”, :(accessed 5 July 2014)
    • Perna, M. (2013), “Security 101: securing SCADA environments”, available at: http://blog.fortinet.com/post/security-101-securing-scada-environments (accessed 5 July 2014).
    • (2013)
    • Perna, M.1
  • 49
    • 84961564190 scopus 로고    scopus 로고
    • “The next evolution of the internet”, :(accessed 20 May)
    • Pretz, K. (2013), “The next evolution of the internet”, available at: http://theinstitute.ieee.org/technology-focus/technology-topic/the-next-evolution-of-the-internet (accessed 20 May).
    • (2013)
    • Pretz, K.1
  • 51
    • 84883314073 scopus 로고    scopus 로고
    • Lithe: lightweight secure CoAP for the Internet of Things
    • “”
    • Raza, S., Shafagh, H., Hewage, K., Hummen, R. and Voigt, T. (2013), “Lithe: lightweight secure CoAP for the Internet of Things”, IEEE Sensors Journal, Vol. 13 No. 10, pp. 3711-3720.
    • (2013) IEEE Sensors Journal , vol.13 , Issue.10 , pp. 3711-3720
    • Raza, S.1    Shafagh, H.2    Hewage, K.3    Hummen, R.4    Voigt, T.5
  • 52
    • 84961638016 scopus 로고    scopus 로고
    • “Top 5 Internet of Things security concerns”, :(accessed 5 September)
    • Roe, D. (2014), “Top 5 Internet of Things security concerns”, available at: www.cmswire.com/cms/internet-of-things/top-5-internet-of-things-security-concerns-026043.php (accessed 5 September).
    • (2014)
    • Roe, D.1
  • 53
    • 80052854156 scopus 로고    scopus 로고
    • Securing the Internet of Things
    • “”
    • Roman, R., Najera, P. and Lopez, J. (2011), “Securing the Internet of Things”, Computer, Vol. 44 No. 9, pp. 51-58.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 54
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed Internet of Things
    • “”
    • Roman, R., Zhou, J. and Lopez, J. (2013), “On the features and challenges of security and privacy in distributed Internet of Things”, Computer Networks, Vol. 57 No. 10, pp. 2266-2279.
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 57
    • 84896931467 scopus 로고    scopus 로고
    • CCIoT-CMfg: cloud computing and Internet of Things based cloud manufacturing service system
    • “”
    • Tao, F., Cheng, Y., Xu, L.D., Zhang, L. and Li, B.H. (2014), “CCIoT-CMfg: cloud computing and Internet of Things based cloud manufacturing service system”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1435-1442.
    • (2014) IEEE Transactions on Industrial Informatics , vol.10 , Issue.2 , pp. 1435-1442
    • Tao, F.1    Cheng, Y.2    Xu, L.D.3    Zhang, L.4    Li, B.H.5
  • 58
    • 84878125540 scopus 로고    scopus 로고
    • A system framework of security management in enterprise systems
    • “”
    • Wang, F., Ge, B., Zhang, L., Chen, Y., Xin, Y. and Li, X. (2013), “A system framework of security management in enterprise systems”, Systems Research and Behavioral Science, Vol. 30 No. 3, pp. 287-299.
    • (2013) Systems Research and Behavioral Science , vol.30 , Issue.3 , pp. 287-299
    • Wang, F.1    Ge, B.2    Zhang, L.3    Chen, Y.4    Xin, Y.5    Li, X.6
  • 59
    • 77953552937 scopus 로고    scopus 로고
    • Cooperative communications based on trust model for mobile ad hoc networks
    • “”
    • Wang, K. and Wu, M. (2010), “Cooperative communications based on trust model for mobile ad hoc networks”, IET Information Security, Vol. 4 No. 2, pp. 68-79.
    • (2010) IET Information Security , vol.4 , Issue.2 , pp. 68-79
    • Wang, K.1    Wu, M.2
  • 60
    • 84880234291 scopus 로고    scopus 로고
    • Internet of Things – governance quo vadis?
    • “”
    • Weber, R.H. (2013), “Internet of Things – governance quo vadis?”, Computer Law & Security Review, Vol. 29 No. 4, pp. 341-347.
    • (2013) Computer Law & Security Review , vol.29 , Issue.4 , pp. 341-347
    • Weber, R.H.1
  • 63
    • 84900826157 scopus 로고    scopus 로고
    • User interoperability with heterogeneous IoT devices through transformation
    • “”
    • Xiao, G., Guo, J., Xu, L. and Gong, Z. (2014), “User interoperability with heterogeneous IoT devices through transformation”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1486-1496.
    • (2014) IEEE Transactions on Industrial Informatics , vol.10 , Issue.2 , pp. 1486-1496
    • Xiao, G.1    Guo, J.2    Xu, L.3    Gong, Z.4
  • 64
    • 84900834753 scopus 로고    scopus 로고
    • Ubiquitous data accessing method in IoT-based information system for emergency medical services
    • a), “”
    • Xu, B., Xu, L.D., Cai, H., Xie, C., Hu, J. and Bu, F. (2014a), “Ubiquitous data accessing method in IoT-based information system for emergency medical services”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 2, pp. 1578-1586.
    • (2014) IEEE Transactions on Industrial Informatics , vol.10 , Issue.2 , pp. 1578-1586
    • Xu, B.1    Xu, L.D.2    Cai, H.3    Xie, C.4    Hu, J.5    Bu, F.6
  • 65
    • 84906834039 scopus 로고    scopus 로고
    • Internet of Things in industries: a survey
    • b), “”
    • Xu, L., He, W. and Li, S. (2014b), “Internet of Things in industries: a survey”, IEEE Transactions on Industrial Informatics, Vol. 10 No. 4, pp. 2233-2243.
    • (2014) IEEE Transactions on Industrial Informatics , vol.10 , Issue.4 , pp. 2233-2243
    • Xu, L.1    He, W.2    Li, S.3
  • 66
    • 78649487968 scopus 로고    scopus 로고
    • Information architecture for supply chain quality management
    • “”
    • Xu, L.D. (2011), “Information architecture for supply chain quality management”, International Journal of Production Research, Vol. 49 No. 1, pp. 183-198.
    • (2011) International Journal of Production Research , vol.49 , Issue.1 , pp. 183-198
    • Xu, L.D.1
  • 67
    • 84883421524 scopus 로고    scopus 로고
    • A lightweight multicast authentication mechanism for small scale IoT applications
    • “”
    • Yao, X., Han, X., Du, X. and Zhou, X. (2013), “A lightweight multicast authentication mechanism for small scale IoT applications”, IEEE Sensors Journal, Vol. 13 No. 10, pp. 3693-3701.
    • (2013) IEEE Sensors Journal , vol.13 , Issue.10 , pp. 3693-3701
    • Yao, X.1    Han, X.2    Du, X.3    Zhou, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.