-
1
-
-
84936802475
-
Security and Privacy in the Internet of Things : Current Status and Open Issues
-
IEEE
-
Mohamed Abomhara and Geir M. Koien. Security and Privacy in the Internet of Things : Current Status and Open Issues. In Privacy and Security in Mobile Systems (PRISMS), pages 1-8. IEEE, 2014.
-
(2014)
Privacy and Security in Mobile Systems (PRISMS)
, pp. 1-8
-
-
Abomhara, M.1
Koien, G.M.2
-
2
-
-
84964226118
-
Threat-Based Security Analysis for the Internet of Things
-
IEEE
-
Ahmad W Atamli and Andrew Martin. Threat-Based Security Analysis for the Internet of Things. In Secure Internet of Things (SIoT), pages 35-43. IEEE, 2014.
-
(2014)
Secure Internet of Things (SIoT)
, pp. 35-43
-
-
Atamli, A.W.1
Martin, A.2
-
3
-
-
77956877124
-
The Internet of Things: A survey
-
October
-
Luigi Atzori, Antonio Iera, and Giacomo Morabito. The Internet of Things: A survey. Computer Networks, 54(15):2787-2805, October 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
4
-
-
77957599265
-
Proposed security model and threat taxonomy for the Internet of Things (IoT)
-
Springer Berlin Heidelberg
-
Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli Prasad, and Ramjee Prasad. Proposed security model and threat taxonomy for the Internet of Things (IoT). In International Conference on Network Security & Applications (CNSA), volume 89, pages 420-429. Springer Berlin Heidelberg, 2010.
-
(2010)
International Conference on Network Security & Applications (CNSA)
, vol.89
, pp. 420-429
-
-
Babar, S.1
Mahalle, P.2
Stango, A.3
Prasad, N.4
Prasad, R.5
-
5
-
-
84902480328
-
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
Martin Bauer and Sebastian Lange. Enabling Things to Talk. Springer Berlin Heidelberg, Berlin, Heidelberg, 2013.
-
(2013)
Enabling Things to Talk
-
-
Bauer, M.1
Lange, S.2
-
7
-
-
84964629688
-
-
October [11 Mar
-
BETaaS Consortium. D1.4.2 - TaaS Reference Model. http://www.betaas.eu/docs/deliverables/BETaaS%20-%20D1.4.2%20-%20TaaS%20Reference%20Model%20v1.0.pdf, October 2013. [11 Mar. 2014].
-
(2013)
D1.4.2 - TaaS Reference Model
-
-
-
8
-
-
84866380368
-
Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples
-
Riccardo Bonetto, Nicola Bui, Vishwas Lakkundi, Alexis Olivereau, Alexandru Serbanati, and Michele Rossi. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples. 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings, 2012.
-
(2012)
2012 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings
-
-
Bonetto, R.1
Bui, N.2
Lakkundi, V.3
Olivereau, A.4
Serbanati, A.5
Rossi, M.6
-
9
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
Vijayalakshmi Atluri, editor, Washington, DC, USA, November 18-22, 2002, ACM
-
Jan Camenisch and Els Van Herreweghen. Design and implementation of the idemix anonymous credential system. In Vijayalakshmi Atluri, editor, Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pages 21-30. ACM, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002
, pp. 21-30
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
10
-
-
0001604533
-
Blind signatures for untraceable payments
-
In David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Santa Barbara, California, USA, August 23-25, 1982., Plenum Press, New York
-
David Chaum. Blind signatures for untraceable payments. In David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982., pages 199-203. Plenum Press, New York, 1982.
-
(1982)
Advances in Cryptology: Proceedings of CRYPTO '82
, pp. 199-203
-
-
Chaum, D.1
-
11
-
-
84880413059
-
Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview
-
Simone Cirani, Gianluigi Ferrari, and Luca Veltri. Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview. Algorithms, 6(2):197-226, 2013.
-
(2013)
Algorithms
, vol.6
, Issue.2
, pp. 197-226
-
-
Cirani, S.1
Ferrari, G.2
Veltri, L.3
-
12
-
-
18844437308
-
IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
-
September Updated by RFC 7268
-
P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese. IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines. RFC 3580 (Informational), September 2003. Updated by RFC 7268.
-
(2003)
RFC 3580 (Informational)
-
-
Congdon, P.1
Aboba, B.2
Smith, A.3
Zorn, G.4
Roese, J.5
-
14
-
-
84964648648
-
-
[31 Jan
-
IoT-A Consortium. Iot-a unified requirements. http://www.iot-a.eu/public/requirements/. [31 Jan. 2014].
-
(2014)
Iot-A Unified Requirements
-
-
-
15
-
-
84947785321
-
A view on privacy & trust in iot
-
London, GB, June 08-12, 2015, page to appear. IEEE
-
Joerg Daubert, Alexander Wiesmaier, and Panayotis Kikiras. A view on privacy & trust in iot. In IOT/CPS-Security Workshop, IEEE International Conference on Communications, ICC 2015, London, GB, June 08-12, 2015, page to appear. IEEE, 2015.
-
(2015)
IOT/CPS-Security Workshop, IEEE International Conference on Communications, ICC 2015
-
-
Daubert, J.1
Wiesmaier, A.2
Kikiras, P.3
-
16
-
-
77956573382
-
The Transport Layer Security (TLS) Protocol Version 1.2
-
August Updated by RFCs 5746, 5878, 6176
-
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), August 2008. Updated by RFCs 5746, 5878, 6176.
-
(2008)
RFC 5246 (Proposed Standard)
-
-
Dierks, T.1
Rescorla, E.2
-
17
-
-
85084161366
-
Tor: The second-generation onion router
-
Matt Blaze, editor, August 9-13, 2004, San Diego, CA, USA, USENIX
-
Roger Dingledine, Nick Mathewson, and Paul F. Syverson. Tor: The second-generation onion router. In Matt Blaze, editor, Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, pages 303-320. USENIX, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
18
-
-
70350682013
-
Differential privacy and robust statistics
-
Michael Mitzenmacher, editor, Bethesda, MD, USA, May 31 - June 2, 2009, ACM
-
Cynthia Dwork and Jing Lei. Differential privacy and robust statistics. In Michael Mitzenmacher, editor, Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pages 371-380. ACM, 2009.
-
(2009)
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009
, pp. 371-380
-
-
Dwork, C.1
Lei, J.2
-
19
-
-
0003187764
-
On the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Parliament and Council of the European Union. On the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal, L(281):0031-0050, 1995.
-
(1995)
Official Journal
, vol.50
, Issue.281
, pp. 0031-0050
-
-
European Parliament1
Council of the European Union2
-
22
-
-
84931054674
-
A unified perspective on the factors influencing consumer acceptance of internet of things technology
-
Lingling Gao and Xuesong Bai. A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pacific Journal of Marketing and Logistics, 26(2):211-231, 2014.
-
(2014)
Asia Pacific Journal of Marketing and Logistics
, vol.26
, Issue.2
, pp. 211-231
-
-
Gao, L.1
Bai, X.2
-
23
-
-
84964648633
-
Security Perspectives for Collaborative Data Acquisition in the Internet of Things
-
Springer
-
Vangelis Gazis, Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Panayotis Kikiras, and Alex Wiesmaier. Security Perspectives for Collaborative Data Acquisition in the Internet of Things. In International Conference on Safety and Security in Internet of Things. Springer, 2014.
-
(2014)
International Conference on Safety and Security in Internet of Things
-
-
Gazis, V.1
Garcia Cordero, C.2
Vasilomanolakis, E.3
Kikiras, P.4
Wiesmaier, A.5
-
24
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
September
-
Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7):1645-1660, September 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
26
-
-
17444392883
-
Protecting client privacy with trusted computing at the server
-
Alexander Iliev and Sean W. Smith. Protecting client privacy with trusted computing at the server. IEEE Security & Privacy, 3(2):20-28, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.2
, pp. 20-28
-
-
Iliev, A.1
Smith, S.W.2
-
28
-
-
84964587301
-
-
July [20 Jul
-
IoT@Work Consortium. D1.2 - Final framework architecture specification. https://www.iot-at-work.eu/data/D1.3-IoT@Work-Architecture-final-v1.0-submitted.pdf, July 2013. [20 Jul. 2014].
-
(2013)
D1.2 - Final Framework Architecture Specification
-
-
-
29
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Audun Jøsang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618-644, 2007.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
30
-
-
78549283709
-
Elliptic curve cryptography
-
Vivek Kapoor, Vivek Sonny Abraham, and Ramesh Singh. Elliptic curve cryptography. ACM Ubiquity, 9(20):20-26, 2008.
-
(2008)
ACM Ubiquity
, vol.9
, Issue.20
, pp. 20-26
-
-
Kapoor, V.1
Abraham, V.S.2
Singh, R.3
-
31
-
-
0003470642
-
Security Architecture for the Internet Protocol
-
November Obsoleted by RFC 4301, updated by RFC 3168
-
S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401 (Proposed Standard), November 1998. Obsoleted by RFC 4301, updated by RFC 3168.
-
(1998)
RFC 2401 (Proposed Standard)
-
-
Kent, S.1
Atkinson, R.2
-
32
-
-
84874174122
-
Future internet: The internet of things architecture, possible applications and key challenges
-
IEEE
-
Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer, and Shahid Khan. Future internet: The internet of things architecture, possible applications and key challenges. In 10th International Conference on Frontiers of Information Technology, FIT, pages 257-260. IEEE, 2012.
-
(2012)
10th International Conference on Frontiers of Information Technology, FIT
, pp. 257-260
-
-
Khan, R.1
Khan, S.U.2
Zaheer, R.3
Khan, S.4
-
33
-
-
84964587291
-
-
Oleg Logvinov, Bruce Kraemer, Chuck Adams, Juergen Heiles, Gary Stuebing, Mary Lynne Nielsen, and Brenda Mancuso. Standard for an Architectural Framework for the Internet of Things ( IoT ) IEEE P2413 Webinar Panelists. pages 1-12, 2014.
-
(2014)
Standard for An Architectural Framework for the Internet of Things ( IoT ) IEEE P2413 Webinar Panelists
, pp. 1-12
-
-
Logvinov, O.1
Kraemer, B.2
Adams, C.3
Heiles, J.4
Stuebing, G.5
Nielsen, M.L.6
Mancuso, B.7
-
34
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. TKDD, 1(1), 2007.
-
(2007)
TKDD
, vol.1
, pp. 1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
35
-
-
84879644289
-
Monitoring and Security for the Internet of Things
-
Springer
-
Anthéa Mayzaud, Rémi Badonnel, and Isabelle Chrisment. Monitoring and Security for the Internet of Things. In International Conference on Autonomous Infrastructure, Management, and Security, pages 37-40. Springer, 2013.
-
(2013)
International Conference on Autonomous Infrastructure, Management, and Security
, pp. 37-40
-
-
Mayzaud, A.1
Badonnel, R.2
Chrisment, I.3
-
36
-
-
80052680150
-
An overview of privacy and security issues in the internet of things
-
Springer
-
Carlo Maria Medaglia and Alexandru Serbanati. An overview of privacy and security issues in the internet of things. In The Internet of Things, pages 389-395. Springer, 2010.
-
(2010)
The Internet of Things
, pp. 389-395
-
-
Medaglia, C.M.1
Serbanati, A.2
-
37
-
-
84861997111
-
Internet of things: Vision, applications and research challenges
-
September
-
Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7):1497-1516, September 2012.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
38
-
-
84876156481
-
Cyberentity Security in the Internet of Things
-
Huansheng Ning, Hong Liu, and Laurence T Yang. Cyberentity Security in the Internet of Things. Computer, 46(4):46-53, 2013.
-
(2013)
Computer
, vol.46
, Issue.4
, pp. 46-53
-
-
Ning, H.1
Liu, H.2
Yang, L.T.3
-
41
-
-
84937564790
-
Anonymity, unobservability, and pseudonymity - A proposal for terminology
-
Hannes Federrath, editor, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, Springer
-
Andreas Pfitzmann and Marit Köhntopp. Anonymity, unobservability, and pseudonymity - A proposal for terminology. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, volume 2009 of Lecture Notes in Computer Science, pages 1-9. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
42
-
-
80052854156
-
Securing the internet of things
-
R Roman, P Najera, and J Lopez. Securing the internet of things. Computer, 44(9):51-58, 2011.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
43
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
July
-
Rodrigo Roman, Jianying Zhou, and Javier Lopez. On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10):2266-2279, July 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
47
-
-
84919372488
-
Security, privacy and trust in internet of things: The road ahead
-
Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76:146-164, 2015.
-
(2015)
Computer Networks
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.A.3
Coen-Porisini, A.4
-
48
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, Texas, USA, January 1988, USENIX Association
-
Jennifer G. Steiner, B. Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, pages 191-202. USENIX Association, 1988.
-
(1988)
Proceedings of the USENIX Winter Conference
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
50
-
-
84861019658
-
Security in the internet of things: A review
-
IEEE
-
Hui Suo, Jiafu Wan, Caifeng Zou, and Jianqi Liu. Security in the internet of things: a review. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, volume 3, pages 648-651. IEEE, 2012.
-
(2012)
Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference On
, vol.3
, pp. 648-651
-
-
Suo, H.1
Wan, J.2
Zou, C.3
Liu, J.4
-
53
-
-
84883160796
-
Security and Privacy Threats in IoT Architectures
-
number International Conference on Body Area Networks, ACM
-
Jari Veijalainen, Denis Kozlov, and Yasir Ali. Security and Privacy Threats in IoT Architectures. In Proceedings of the 7th International Conference on Body Area Networks, number International Conference on Body Area Networks, pages 256-262. ACM, 2012.
-
(2012)
Proceedings of the 7th International Conference on Body Area Networks
, pp. 256-262
-
-
Veijalainen, J.1
Kozlov, D.2
Ali, Y.3
-
54
-
-
74949143896
-
Internet of Things - New security and privacy challenges
-
January
-
Rolf H. Weber. Internet of Things - New security and privacy challenges. Computer Law & Security Review, 26(1):23-30, January 2010.
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
55
-
-
35448967088
-
M-invariance: Towards privacy preserving re-publication of dynamic datasets
-
Chee Yong Chan, Beng Chin Ooi, and Aoying Zhou, editors, Beijing, China, June 12-14, 2007. ACM
-
Xiaokui Xiao and Yufei Tao. M-invariance: towards privacy preserving re-publication of dynamic datasets. In Chee Yong Chan, Beng Chin Ooi, and Aoying Zhou, editors, Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, 2007, pages 689-700. ACM, 2007.
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
56
-
-
84908397157
-
Internet of things for smart cities
-
Andrea Zanella, Nicola Bui, Angelo P Castellani, Lorenzo Vangelista, and Michele Zorzi. Internet of things for smart cities. IEEE Internet of Things Journal, 2014.
-
(2014)
IEEE Internet of Things Journal
-
-
Zanella, A.1
Bui, N.2
Castellani, A.P.3
Vangelista, L.4
Zorzi, M.5
-
57
-
-
84942523308
-
Emerging Security Threats and Countermeasures in IoT
-
ACM
-
Zhi-kai Zhang, Michael Cheng, Yi Cho, and Shiuhpyng Shieh. Emerging Security Threats and Countermeasures in IoT. In ACM Symposium on Information, Computer and Communications Security, pages 1-6. ACM, 2015.
-
(2015)
ACM Symposium on Information, Computer and Communications Security
, pp. 1-6
-
-
Zhang, Z.-K.1
Cheng, M.2
Cho, Y.3
Shieh, S.4
|