메뉴 건너뛰기




Volumn 2016-February, Issue , 2016, Pages 180-187

Internet of Things: Security vulnerabilities and challenges

Author keywords

attacks; countermeasures; Internet of Things; security challenges

Indexed keywords

COMMUNICATION; RADAR COUNTERMEASURES;

EID: 84961943315     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2015.7405513     Document Type: Conference Paper
Times cited : (421)

References (53)
  • 1
    • 84900458620 scopus 로고    scopus 로고
    • A survey of Internet-of-Things: Future vision, architecture, challenges and services
    • IEEE
    • D. Singh, G. Tripathi, and A.J. Jara. "A survey of Internet-of-Things: Future vision, architecture, challenges and services." In Internet of Things (WF-IoT), 2014 IEEE World Forum on, pp. 287-292. IEEE, 2014.
    • (2014) Internet of Things (WF-IoT 2014 IEEE World Forum on , pp. 287-292
    • Singh, D.1    Tripathi, G.2    Jara, A.J.3
  • 4
    • 80955160447 scopus 로고    scopus 로고
    • That internet of things thing
    • K. Ashton, "That internet of things thing." RFiD Journal 22, no. 7 (2009): 97-114.
    • (2009) RFID Journal , vol.22 , Issue.7 , pp. 97-114
    • Ashton, K.1
  • 13
    • 84864972900 scopus 로고    scopus 로고
    • A multi-layer security model for internet of things
    • Springer Berlin Heidelberg
    • X Yang, Z Li, Z Geng, and H Zhang, "A Multi-layer Security Model for Internet of Things." In Internet of Things, pp. 388-393. Springer Berlin Heidelberg, 2012.
    • (2012) Internet of Things , pp. 388-393
    • Yang, X.1    Li, Z.2    Geng, Z.3    Zhang, H.4
  • 16
    • 46449122114 scopus 로고    scopus 로고
    • Wireless sensor network survey
    • J. Yick, B. Mukherjee, and D. Ghosal. "Wireless sensor network survey." Computer networks 52, no. 12 (2008): 2292-2330
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2292-2330
    • Yick, J.1    Mukherjee, B.2    Ghosal, D.3
  • 17
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29, no. 7 (2013): 1645-1660.Asd
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 18
    • 84874174122 scopus 로고    scopus 로고
    • Future internet: The internet of things architecture, possible applications and key challenges
    • R. Khan, S. U. Khan, R. Zaheer, and S. Khan "Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges." In FIT, pp. 257-260. 2012.
    • (2012) FIT , pp. 257-260
    • Khan, R.1    Khan, S.U.2    Zaheer, R.3    Khan, S.4
  • 19
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29, no. 7 (2013): 1645-1660
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 20
    • 84939161468 scopus 로고    scopus 로고
    • A critical analysis on the security concerns of internet of things (iot)
    • M. U. Farooq, M. Waseem, A. Khairi, and S. Mazhar, "A Critical Analysis on the Security Concerns of Internet of Things (IoT)." Perception 111, no. 7 (2015)
    • (2015) Perception , vol.111 , Issue.7
    • Farooq, M.U.1    Waseem, M.2    Khairi, A.3    Mazhar, S.4
  • 22
    • 84961889450 scopus 로고    scopus 로고
    • Classification of RFID attacks
    • A. Mitrokotsa, M. R. Rieback, and A. S. Tanenbaum, "Classification of RFID attacks." Gen 15693 (2010): 14443.
    • (2010) Gen , vol.5693 , pp. 14443
    • Mitrokotsa, A.1    Rieback, M.R.2    Tanenbaum, A.S.3
  • 32
    • 84926294459 scopus 로고    scopus 로고
    • Routing security in sensor network: Hello flood attack and defense
    • M. A. Hamid, M. Mamun-Or-Rashid, and C. S. Hong, "Routing security in sensor network: Hello flood attack and defense." IEEE ICNEWS (2006): 2-4.
    • (2006) IEEE ICNEWS , pp. 2-4
    • Hamid, M.A.1    Mamun-Or-Rashid, M.2    Hong, C.S.3
  • 35
    • 83555176391 scopus 로고    scopus 로고
    • Security challenges in the IP-based internet of things
    • H. Tobias, et al. "Security Challenges in the IP-based Internet of Things." Wireless Personal Communications 61, no. 3 (2011): 527-542
    • (2011) Wireless Personal Communications , vol.61 , Issue.3 , pp. 527-542
    • Tobias, H.1
  • 36
    • 80052680150 scopus 로고    scopus 로고
    • An overview of privacy and security issues in the internet of things
    • Springer New York
    • C. M, Medaglia, and A. Serbanati. "An overview of privacy and security issues in the internet of things." In The Internet of Things, pp. 389-395. Springer New York, 2010.
    • (2010) The Internet of Things , pp. 389-395
    • Medaglia, C.M.1    Serbanati, A.2
  • 37
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Springer Berlin Heidelberg
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems." In Security in pervasive computing, pp. 201-212. Springer Berlin Heidelberg, 2004.
    • (2004) Security in Pervasive Computing , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4
  • 40
    • 0024135240 scopus 로고
    • Zero-knowledge proofs of identity
    • U. Feige, F. Amos, and S. Adi, . "Zero-knowledge proofs of identity." Journal of cryptology 1, no. 2 (1988): 77-94.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 77-94
    • Feige, U.1    Amos, F.2    Adi, S.3
  • 43
    • 84905836802 scopus 로고    scopus 로고
    • Research on security issues of the internet of things
    • X. F. Wang, "Research on Security Issues of the Internet of Things." In Advanced Materials Research, vol. 989, pp. 4261-4264. 2014.
    • (2014) Advanced Materials Research , vol.989 , pp. 4261-4264
    • Wang, X.F.1
  • 46
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha, and J. M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends." Computer Networks 51, no. 12 (2007): 3448-347
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-4347
    • Patcha, A.1    Park, J.M.2
  • 47
    • 84866346403 scopus 로고    scopus 로고
    • TRM-IoT: A trust management model based on fuzzy reputation for internet of things
    • D. Chen, G. Chang, D. Sun, J. Li, J. Jia and X. Wang "TRM-IoT: A trust management model based on fuzzy reputation for internet of things." Computer Science and Information Systems 8, no. 4 (2011): 1207-1228
    • (2011) Computer Science and Information Systems , vol.8 , Issue.4 , pp. 1207-1228
    • Chen, D.1    Chang, G.2    Sun, D.3    Li, J.4    Jia, J.5    Wang, X.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.