메뉴 건너뛰기




Volumn , Issue , 2016, Pages 336-341

Internet of things (IoT) security: Current status, challenges and prospective measures

Author keywords

Internet of things; IoT; Security

Indexed keywords

INTERNET;

EID: 84964556793     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICITST.2015.7412116     Document Type: Conference Paper
Times cited : (622)

References (21)
  • 3
    • 84866034380 scopus 로고    scopus 로고
    • The social internet of things (siot)-when social networks meet the internet of things: Concept, architecture and network characterization
    • L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social internet of things (siot)-when social networks meet the internet of things: Concept, architecture and network characterization," Computer Networks, vol. 56, 3594-3608, 2012.
    • (2012) Computer Networks , vol.56 , pp. 3594-3608
    • Atzori, L.1    Iera, A.2    Morabito, G.3    Nitti, M.4
  • 5
    • 85002424663 scopus 로고    scopus 로고
    • Identity authentication and capability based access control (iacac) for the internet of things
    • P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, "Identity authentication and capability based access control (iacac) for the internet of things," J. of Cyber Security and Mobility, vol. 1, 309-348, 2013.
    • (2013) J. of Cyber Security and Mobility , vol.1 , pp. 309-348
    • Mahalle, P.N.1    Anggorojati, B.2    Prasad, N.R.3    Prasad, R.4
  • 6
    • 84939161468 scopus 로고    scopus 로고
    • A critical analysis on the security concerns of internet of things (iot)
    • M. Farooq, M. Waseem, A. Khairi, and S. Mazhar, "A Critical Analysis on the Security Concerns of Internet of Things (IoT)," Perception, vol. 111, 2015.
    • (2015) Perception , vol.111
    • Farooq, M.1    Waseem, M.2    Khairi, A.3    Mazhar, S.4
  • 7
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • R. Roman, P. Najera, and J. Lopez, "Securing the internet of things," Computer, vol. 44, 51-58, 2011.
    • (2011) Computer , vol.44 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 8
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things," Computer Networks, vol. 57, 2266-2279, 2013.
    • (2013) Computer Networks , vol.57 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 11
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic curve cryptosystems," Mathematics of computation, vol. 48, 203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 13
    • 84901805129 scopus 로고    scopus 로고
    • An item-level access control framework for inter-system security in the internet of things
    • Y. Xie and D. Wang, "An Item-Level Access Control Framework for Inter-System Security in the Internet of Things," in Applied Mechanics and Materials, 1430-1432, 2014.
    • (2014) Applied Mechanics and Materials , pp. 1430-1432
    • Xie, Y.1    Wang, D.2
  • 19
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in Internet of Things: The road ahead
    • S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer Networks, vol. 76, 146-164, 2015.
    • (2015) Computer Networks , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.3    Coen-Porisini, A.4
  • 20
    • 84903647209 scopus 로고    scopus 로고
    • Emerging technologies and research challenges for 5G wireless networks
    • W. H. Chin, Z. Fan, and R. Haines, "Emerging technologies and research challenges for 5G wireless networks," Wireless Communications, vol. 21, 106-112, 2014.
    • (2014) Wireless Communications , vol.21 , pp. 106-112
    • Chin, W.H.1    Fan, Z.2    Haines, R.3
  • 21
    • 84927731786 scopus 로고    scopus 로고
    • Authentication handover and privacy protection in 5G hetnets using software-defined networking
    • X. Duan and X. Wang, "Authentication handover and privacy protection in 5G hetnets using software-defined networking," Communications Magazine, vol. 53, 28-35, 2015.
    • (2015) Communications Magazine , vol.53 , pp. 28-35
    • Duan, X.1    Wang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.