-
1
-
-
84900458620
-
A survey of Internet-of-Things: Future vision, architecture, challenges and services
-
IEEE
-
D. Singh, G. Tripathi, and A.J. Jara. "A survey of Internet-of-Things: Future vision, architecture, challenges and services." In Internet of Things (WF-IoT), 2014 IEEE World Forum on, pp. 287-292. IEEE, 2014.
-
(2014)
Internet of Things (WF-IoT 2014 IEEE World Forum on
, pp. 287-292
-
-
Singh, D.1
Tripathi, G.2
Jara, A.J.3
-
2
-
-
84893602968
-
-
White Paper, Cisco Systems Inc
-
J. Bradley, J. Barbier, and D. Handler. "Embracing the Internet of Everything To Capture Your Share of $14.4 Trillion: More Relevant, Valuable Connections Will Improve Innovation, Productivity, Efficiency & Customer Experience CISCO Whitepaper." White Paper, Cisco Systems Inc (2013).
-
(2013)
Embracing the Internet of Everything to Capture Your Share of $14.4 Trillion: More Relevant, Valuable Connections Will Improve Innovation, Productivity, Efficiency & Customer Experience CISCO Whitepaper
-
-
Bradley, J.1
Barbier, J.2
Handler, D.3
-
4
-
-
80955160447
-
That internet of things thing
-
K. Ashton, "That internet of things thing." RFiD Journal 22, no. 7 (2009): 97-114.
-
(2009)
RFID Journal
, vol.22
, Issue.7
, pp. 97-114
-
-
Ashton, K.1
-
5
-
-
84861019658
-
Security in the internet of things: A review
-
IEEE
-
H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the internet of things: A review." In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 3, pp. 648-651. IEEE, 2012.
-
(2012)
Computer Science and Electronics Engineering (ICCSEE 2012 International Conference on
, vol.3
, pp. 648-651
-
-
Suo, H.1
Wan, J.2
Zou, C.3
Liu, J.4
-
6
-
-
78149352226
-
Research on the architecture of Internet of things
-
IEEE
-
M. Wu, T. J. Lu, F. Y. Ling, J. Sun, and H. Y. Du, "Research on the architecture of Internet of things." In Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, vol. 5, pp. V5-484. IEEE, 2010.
-
(2010)
Advanced Computer Theory and Engineering (ICACTE) 2010 3rd International Conference on
, vol.5
, pp. V5-484
-
-
Wu, M.1
Lu, T.J.2
Ling, F.Y.3
Sun, J.4
Du, H.Y.5
-
13
-
-
84864972900
-
A multi-layer security model for internet of things
-
Springer Berlin Heidelberg
-
X Yang, Z Li, Z Geng, and H Zhang, "A Multi-layer Security Model for Internet of Things." In Internet of Things, pp. 388-393. Springer Berlin Heidelberg, 2012.
-
(2012)
Internet of Things
, pp. 388-393
-
-
Yang, X.1
Li, Z.2
Geng, Z.3
Zhang, H.4
-
14
-
-
51849104270
-
MQTT-S-A publish/subscribe protocol for Wireless Sensor Networks
-
IEEE
-
U. Hunkeler, H. L. Truong, and A. Stanford-Clark, "MQTT-S-A publish/subscribe protocol for Wireless Sensor Networks." In Communication systems software and middleware and workshops, 2008. comsware 2008. 3rd international conference on, pp. 791-798. IEEE, 2008.
-
(2008)
Communication Systems Software and Middleware and Workshops 2008 Comsware 2008. 3rd International Conference on
, pp. 791-798
-
-
Hunkeler, U.1
Truong, H.L.2
Stanford-Clark, A.3
-
16
-
-
46449122114
-
Wireless sensor network survey
-
J. Yick, B. Mukherjee, and D. Ghosal. "Wireless sensor network survey." Computer networks 52, no. 12 (2008): 2292-2330
-
(2008)
Computer Networks
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
17
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29, no. 7 (2013): 1645-1660.Asd
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
18
-
-
84874174122
-
Future internet: The internet of things architecture, possible applications and key challenges
-
R. Khan, S. U. Khan, R. Zaheer, and S. Khan "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges." In FIT, pp. 257-260. 2012.
-
(2012)
FIT
, pp. 257-260
-
-
Khan, R.1
Khan, S.U.2
Zaheer, R.3
Khan, S.4
-
19
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29, no. 7 (2013): 1645-1660
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
20
-
-
84939161468
-
A critical analysis on the security concerns of internet of things (iot)
-
M. U. Farooq, M. Waseem, A. Khairi, and S. Mazhar, "A Critical Analysis on the Security Concerns of Internet of Things (IoT)." Perception 111, no. 7 (2015)
-
(2015)
Perception
, vol.111
, Issue.7
-
-
Farooq, M.U.1
Waseem, M.2
Khairi, A.3
Mazhar, S.4
-
25
-
-
84867065150
-
Study on security architecture in the Internet of Things
-
IEEE
-
L. Li, "Study on security architecture in the Internet of Things." In Measurement, Information and Control (MIC), 2012 International Conference on, vol. 1, pp. 374-377. IEEE, 2012.
-
(2012)
Measurement, Information and Control (MIC) 2012 International Conference on
, vol.1
, pp. 374-377
-
-
Li, L.1
-
26
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks." Communications of the ACM 47, no. 6 (2004): 53-57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
29
-
-
84941044100
-
Cloud computing: Security issues and research challenges
-
R. P. Padhy, M. R. Patra, and S. C. Satapathy, "Cloud Computing: Security Issues and Research Challenges." International Journal of Computer Science and Information Technology & Security (IJCSITS) 1, no. 2 (2011): 136-146.
-
(2011)
International Journal of Computer Science and Information Technology & Security (IJCSITS
, vol.1
, Issue.2
, pp. 136-146
-
-
Padhy, R.P.1
Patra, M.R.2
Satapathy, S.C.3
-
30
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
ACM
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis & defenses." In Proceedings of the 3rd international symposium on Information processing in sensor networks, pp. 259-268. ACM, 2004.
-
(2004)
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
31
-
-
72949104155
-
A survey on jamming attacks and countermeasures in WSNs
-
IEEE
-
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou, "A survey on jamming attacks and countermeasures in WSNs." Communications Surveys & Tutorials, IEEE 11, no. 4 (2009): 42-56.
-
(2009)
Communications Surveys & Tutorials
, vol.11
, Issue.4
, pp. 42-56
-
-
Mpitziopoulos, A.1
Gavalas, D.2
Konstantopoulos, C.3
Pantziou, G.4
-
32
-
-
84926294459
-
Routing security in sensor network: Hello flood attack and defense
-
M. A. Hamid, M. Mamun-Or-Rashid, and C. S. Hong, "Routing security in sensor network: Hello flood attack and defense." IEEE ICNEWS (2006): 2-4.
-
(2006)
IEEE ICNEWS
, pp. 2-4
-
-
Hamid, M.A.1
Mamun-Or-Rashid, M.2
Hong, C.S.3
-
33
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Social phishing." Communications of the ACM 50, no. 10 (2007): 94-100.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
35
-
-
83555176391
-
Security challenges in the IP-based internet of things
-
H. Tobias, et al. "Security Challenges in the IP-based Internet of Things." Wireless Personal Communications 61, no. 3 (2011): 527-542
-
(2011)
Wireless Personal Communications
, vol.61
, Issue.3
, pp. 527-542
-
-
Tobias, H.1
-
36
-
-
80052680150
-
An overview of privacy and security issues in the internet of things
-
Springer New York
-
C. M, Medaglia, and A. Serbanati. "An overview of privacy and security issues in the internet of things." In The Internet of Things, pp. 389-395. Springer New York, 2010.
-
(2010)
The Internet of Things
, pp. 389-395
-
-
Medaglia, C.M.1
Serbanati, A.2
-
37
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Springer Berlin Heidelberg
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems." In Security in pervasive computing, pp. 201-212. Springer Berlin Heidelberg, 2004.
-
(2004)
Security in Pervasive Computing
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
40
-
-
0024135240
-
Zero-knowledge proofs of identity
-
U. Feige, F. Amos, and S. Adi, . "Zero-knowledge proofs of identity." Journal of cryptology 1, no. 2 (1988): 77-94.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Amos, F.2
Adi, S.3
-
43
-
-
84905836802
-
Research on security issues of the internet of things
-
X. F. Wang, "Research on Security Issues of the Internet of Things." In Advanced Materials Research, vol. 989, pp. 4261-4264. 2014.
-
(2014)
Advanced Materials Research
, vol.989
, pp. 4261-4264
-
-
Wang, X.F.1
-
44
-
-
84887108052
-
A density-based energy-efficient clustering algorithm for wireless sensor networks
-
Z. Xu, Y. Yin, and J. Wang, "A density-based energy-efficient clustering algorithm for wireless sensor networks." International Journal of Future Generation Communication and Networking 6, no. 1 (2013): 75-86.
-
(2013)
International Journal of Future Generation Communication and Networking
, vol.6
, Issue.1
, pp. 75-86
-
-
Xu, Z.1
Yin, Y.2
Wang, J.3
-
45
-
-
84866169146
-
Research on dynamical security risk assessment for the internet of things inspired by immunology
-
IEEE
-
C. Liu, Y. Zhang, J. Zeng, L. Peng, and R, Chen, "Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology." In Natural Computation (ICNC), 2012 Eighth International Conference on, pp. 874-878. IEEE, 2012.
-
(2012)
Natural Computation (ICNC) 2012 Eighth International Conference on
, pp. 874-878
-
-
Liu, C.1
Zhang, Y.2
Zeng, J.3
Peng, L.4
Chen, R.5
-
46
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A. Patcha, and J. M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends." Computer Networks 51, no. 12 (2007): 3448-347
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-4347
-
-
Patcha, A.1
Park, J.M.2
-
47
-
-
84866346403
-
TRM-IoT: A trust management model based on fuzzy reputation for internet of things
-
D. Chen, G. Chang, D. Sun, J. Li, J. Jia and X. Wang "TRM-IoT: A trust management model based on fuzzy reputation for internet of things." Computer Science and Information Systems 8, no. 4 (2011): 1207-1228
-
(2011)
Computer Science and Information Systems
, vol.8
, Issue.4
, pp. 1207-1228
-
-
Chen, D.1
Chang, G.2
Sun, D.3
Li, J.4
Jia, J.5
Wang, X.6
-
49
-
-
85016075154
-
Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems
-
F. Bao, I. Chen and J. Guo, "Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems", in Proc. of IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), (2013), pp.1-7.
-
(2013)
Proc. of IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)
, pp. 1-7
-
-
Bao, F.1
Chen, I.2
Guo, J.3
-
50
-
-
84871995068
-
A subjective model for trustworthiness evaluation in the social Internet of Things
-
M. Nitti, R. Girau, L. Atzori, A. Iera and G. Morabito, "A subjective model for trustworthiness evaluation in the social Internet of Things", in Proc. of IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), (2012) pp. 18-23.
-
(2012)
Proc. of IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC)
, pp. 18-23
-
-
Nitti, M.1
Girau, R.2
Atzori, L.3
Iera, A.4
Morabito, G.5
-
52
-
-
84868145125
-
Trustworthy infrastructure services for a secure and privacy-respecting internet of things
-
D. Gessner, A. Olivereau, A.S. Segura and A. Serbanati, "Trustworthy infrastructure services for a secure and privacy-respecting internet of things", in Proc. of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), (2012) pp.998-1003.
-
(2012)
Proc. of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
, pp. 998-1003
-
-
Gessner, D.1
Olivereau, A.2
Segura, A.S.3
Serbanati, A.4
|