메뉴 건너뛰기




Volumn , Issue , 2016, Pages 49-57

On the Security and Privacy of Internet of Things Architectures and Systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PRIVACY; INTERNET; SURVEYS;

EID: 84964677884     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SIOT.2015.9     Document Type: Conference Paper
Times cited : (114)

References (57)
  • 1
    • 84936802475 scopus 로고    scopus 로고
    • Security and Privacy in the Internet of Things : Current Status and Open Issues
    • IEEE
    • Mohamed Abomhara and Geir M. Koien. Security and Privacy in the Internet of Things : Current Status and Open Issues. In Privacy and Security in Mobile Systems (PRISMS), pages 1-8. IEEE, 2014.
    • (2014) Privacy and Security in Mobile Systems (PRISMS) , pp. 1-8
    • Abomhara, M.1    Koien, G.M.2
  • 2
    • 84964226118 scopus 로고    scopus 로고
    • Threat-Based Security Analysis for the Internet of Things
    • IEEE
    • Ahmad W Atamli and Andrew Martin. Threat-Based Security Analysis for the Internet of Things. In Secure Internet of Things (SIoT), pages 35-43. IEEE, 2014.
    • (2014) Secure Internet of Things (SIoT) , pp. 35-43
    • Atamli, A.W.1    Martin, A.2
  • 3
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • October
    • Luigi Atzori, Antonio Iera, and Giacomo Morabito. The Internet of Things: A survey. Computer Networks, 54(15):2787-2805, October 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 5
    • 84902480328 scopus 로고    scopus 로고
    • Springer Berlin Heidelberg, Berlin, Heidelberg
    • Martin Bauer and Sebastian Lange. Enabling Things to Talk. Springer Berlin Heidelberg, Berlin, Heidelberg, 2013.
    • (2013) Enabling Things to Talk
    • Bauer, M.1    Lange, S.2
  • 7
    • 84964629688 scopus 로고    scopus 로고
    • October [11 Mar
    • BETaaS Consortium. D1.4.2 - TaaS Reference Model. http://www.betaas.eu/docs/deliverables/BETaaS%20-%20D1.4.2%20-%20TaaS%20Reference%20Model%20v1.0.pdf, October 2013. [11 Mar. 2014].
    • (2013) D1.4.2 - TaaS Reference Model
  • 10
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • In David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Santa Barbara, California, USA, August 23-25, 1982., Plenum Press, New York
    • David Chaum. Blind signatures for untraceable payments. In David Chaum, Ronald L. Rivest, and Alan T. Sherman, editors, Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982., pages 199-203. Plenum Press, New York, 1982.
    • (1982) Advances in Cryptology: Proceedings of CRYPTO '82 , pp. 199-203
    • Chaum, D.1
  • 11
    • 84880413059 scopus 로고    scopus 로고
    • Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview
    • Simone Cirani, Gianluigi Ferrari, and Luca Veltri. Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview. Algorithms, 6(2):197-226, 2013.
    • (2013) Algorithms , vol.6 , Issue.2 , pp. 197-226
    • Cirani, S.1    Ferrari, G.2    Veltri, L.3
  • 12
    • 18844437308 scopus 로고    scopus 로고
    • IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines
    • September Updated by RFC 7268
    • P. Congdon, B. Aboba, A. Smith, G. Zorn, and J. Roese. IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines. RFC 3580 (Informational), September 2003. Updated by RFC 7268.
    • (2003) RFC 3580 (Informational)
    • Congdon, P.1    Aboba, B.2    Smith, A.3    Zorn, G.4    Roese, J.5
  • 14
    • 84964648648 scopus 로고    scopus 로고
    • [31 Jan
    • IoT-A Consortium. Iot-a unified requirements. http://www.iot-a.eu/public/requirements/. [31 Jan. 2014].
    • (2014) Iot-A Unified Requirements
  • 16
    • 77956573382 scopus 로고    scopus 로고
    • The Transport Layer Security (TLS) Protocol Version 1.2
    • August Updated by RFCs 5746, 5878, 6176
    • T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), August 2008. Updated by RFCs 5746, 5878, 6176.
    • (2008) RFC 5246 (Proposed Standard)
    • Dierks, T.1    Rescorla, E.2
  • 17
    • 85084161366 scopus 로고    scopus 로고
    • Tor: The second-generation onion router
    • Matt Blaze, editor, August 9-13, 2004, San Diego, CA, USA, USENIX
    • Roger Dingledine, Nick Mathewson, and Paul F. Syverson. Tor: The second-generation onion router. In Matt Blaze, editor, Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, pages 303-320. USENIX, 2004.
    • (2004) Proceedings of the 13th USENIX Security Symposium , pp. 303-320
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.F.3
  • 18
    • 70350682013 scopus 로고    scopus 로고
    • Differential privacy and robust statistics
    • Michael Mitzenmacher, editor, Bethesda, MD, USA, May 31 - June 2, 2009, ACM
    • Cynthia Dwork and Jing Lei. Differential privacy and robust statistics. In Michael Mitzenmacher, editor, Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pages 371-380. ACM, 2009.
    • (2009) Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009 , pp. 371-380
    • Dwork, C.1    Lei, J.2
  • 19
    • 0003187764 scopus 로고
    • On the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Parliament and Council of the European Union. On the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal, L(281):0031-0050, 1995.
    • (1995) Official Journal , vol.50 , Issue.281 , pp. 0031-0050
    • European Parliament1    Council of the European Union2
  • 22
    • 84931054674 scopus 로고    scopus 로고
    • A unified perspective on the factors influencing consumer acceptance of internet of things technology
    • Lingling Gao and Xuesong Bai. A unified perspective on the factors influencing consumer acceptance of internet of things technology. Asia Pacific Journal of Marketing and Logistics, 26(2):211-231, 2014.
    • (2014) Asia Pacific Journal of Marketing and Logistics , vol.26 , Issue.2 , pp. 211-231
    • Gao, L.1    Bai, X.2
  • 24
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • September
    • Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7):1645-1660, September 2013.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 26
    • 17444392883 scopus 로고    scopus 로고
    • Protecting client privacy with trusted computing at the server
    • Alexander Iliev and Sean W. Smith. Protecting client privacy with trusted computing at the server. IEEE Security & Privacy, 3(2):20-28, 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.2 , pp. 20-28
    • Iliev, A.1    Smith, S.W.2
  • 28
    • 84964587301 scopus 로고    scopus 로고
    • July [20 Jul
    • IoT@Work Consortium. D1.2 - Final framework architecture specification. https://www.iot-at-work.eu/data/D1.3-IoT@Work-Architecture-final-v1.0-submitted.pdf, July 2013. [20 Jul. 2014].
    • (2013) D1.2 - Final Framework Architecture Specification
  • 29
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Audun Jøsang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618-644, 2007.
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 30
    • 78549283709 scopus 로고    scopus 로고
    • Elliptic curve cryptography
    • Vivek Kapoor, Vivek Sonny Abraham, and Ramesh Singh. Elliptic curve cryptography. ACM Ubiquity, 9(20):20-26, 2008.
    • (2008) ACM Ubiquity , vol.9 , Issue.20 , pp. 20-26
    • Kapoor, V.1    Abraham, V.S.2    Singh, R.3
  • 31
    • 0003470642 scopus 로고    scopus 로고
    • Security Architecture for the Internet Protocol
    • November Obsoleted by RFC 4301, updated by RFC 3168
    • S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. RFC 2401 (Proposed Standard), November 1998. Obsoleted by RFC 4301, updated by RFC 3168.
    • (1998) RFC 2401 (Proposed Standard)
    • Kent, S.1    Atkinson, R.2
  • 36
    • 80052680150 scopus 로고    scopus 로고
    • An overview of privacy and security issues in the internet of things
    • Springer
    • Carlo Maria Medaglia and Alexandru Serbanati. An overview of privacy and security issues in the internet of things. In The Internet of Things, pages 389-395. Springer, 2010.
    • (2010) The Internet of Things , pp. 389-395
    • Medaglia, C.M.1    Serbanati, A.2
  • 37
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision, applications and research challenges
    • September
    • Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7):1497-1516, September 2012.
    • (2012) Ad Hoc Networks , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 38
    • 84876156481 scopus 로고    scopus 로고
    • Cyberentity Security in the Internet of Things
    • Huansheng Ning, Hong Liu, and Laurence T Yang. Cyberentity Security in the Internet of Things. Computer, 46(4):46-53, 2013.
    • (2013) Computer , vol.46 , Issue.4 , pp. 46-53
    • Ning, H.1    Liu, H.2    Yang, L.T.3
  • 41
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity - A proposal for terminology
    • Hannes Federrath, editor, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, Springer
    • Andreas Pfitzmann and Marit Köhntopp. Anonymity, unobservability, and pseudonymity - A proposal for terminology. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proceedings, volume 2009 of Lecture Notes in Computer Science, pages 1-9. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 42
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • R Roman, P Najera, and J Lopez. Securing the internet of things. Computer, 44(9):51-58, 2011.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 43
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • July
    • Rodrigo Roman, Jianying Zhou, and Javier Lopez. On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10):2266-2279, July 2013.
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 47
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in internet of things: The road ahead
    • Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76:146-164, 2015.
    • (2015) Computer Networks , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.A.3    Coen-Porisini, A.4
  • 48
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Dallas, Texas, USA, January 1988, USENIX Association
    • Jennifer G. Steiner, B. Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, pages 191-202. USENIX Association, 1988.
    • (1988) Proceedings of the USENIX Winter Conference , pp. 191-202
    • Steiner, J.G.1    Neuman, B.C.2    Schiller, J.I.3
  • 54
    • 74949143896 scopus 로고    scopus 로고
    • Internet of Things - New security and privacy challenges
    • January
    • Rolf H. Weber. Internet of Things - New security and privacy challenges. Computer Law & Security Review, 26(1):23-30, January 2010.
    • (2010) Computer Law & Security Review , vol.26 , Issue.1 , pp. 23-30
    • Weber, R.H.1
  • 55
    • 35448967088 scopus 로고    scopus 로고
    • M-invariance: Towards privacy preserving re-publication of dynamic datasets
    • Chee Yong Chan, Beng Chin Ooi, and Aoying Zhou, editors, Beijing, China, June 12-14, 2007. ACM
    • Xiaokui Xiao and Yufei Tao. M-invariance: towards privacy preserving re-publication of dynamic datasets. In Chee Yong Chan, Beng Chin Ooi, and Aoying Zhou, editors, Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, 2007, pages 689-700. ACM, 2007.
    • (2007) Proceedings of the ACM SIGMOD International Conference on Management of Data , pp. 689-700
    • Xiao, X.1    Tao, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.