메뉴 건너뛰기




Volumn 2016-March, Issue , 2016, Pages 5772-5781

Security in internet of things: Challenges, solutions and future directions

Author keywords

Attacks; Framework; Internet of things; Privacy; Protection methods; Reliability; Security; Threats

Indexed keywords

DATA PRIVACY; INTERNET; RELIABILITY;

EID: 84975528034     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2016.714     Document Type: Conference Paper
Times cited : (218)

References (37)
  • 6
    • 84857249882 scopus 로고    scopus 로고
    • The reinforcement of communication security of the internet of things in the field of intelligent home through the use of middleware
    • Li You-guo, Jiang Ming-fu."The Reinforcement of Communication Security of the Internet of Things in the Field of Intelligent Home Through the Use Of Middleware", Fourth International Symposium on Knowledge Acquisition and Modeling (KAM), pp. 254-257 2011
    • (2011) Fourth International Symposium on Knowledge Acquisition and Modeling (KAM , pp. 254-257
    • You-Guo, L.1    Ming-Fu, J.2
  • 12
    • 84855934497 scopus 로고    scopus 로고
    • Security metrics for e-healthcare information systems: A domain specific metrics approach
    • Jafari, S., Mtenzi, F., Fitzpatrick, R., and O'Shea, B., Security metrics for e-healthcare information systems: A domain specific metrics approach", Int. Journal of Digital Society, Vol. 1, No.4, pp. 238-245, 2010.
    • (2010) Int. Journal of Digital Society , vol.1 , Issue.4 , pp. 238-245
    • Jafari, S.1    Mtenzi, F.2    Fitzpatrick, R.3    O'Shea, B.4
  • 20
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Atzoria, L., Ierab, A., and Morabito, G. 2010. "The Internet of Things: A survey", Computer Networks, vol. 54, no. 15, pp. 2787-2805.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzoria, L.1    Ierab, A.2    Morabito, G.3
  • 22
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision, applications and research challenges
    • Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. Internet of things: Vision, applications and research challenges", Ad Hoc Networks, 10(7), 1497-1516, 2012.
    • (2012) Ad Hoc Networks , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 24
    • 9144237639 scopus 로고    scopus 로고
    • An adaptive and predictive security model for mobile ad hoc Networks
    • S. P. Alampalayam and A. Kumar, "An adaptive and predictive security model for mobile ad hoc Networks", Springer Wireless Personal Communications 29 (3-4), pp. 263-281, 2004
    • (2004) Springer Wireless Personal Communications , vol.29 , Issue.3-4 , pp. 263-281
    • Alampalayam, S.P.1    Kumar, A.2
  • 25
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
    • M. Turkanovic, B. Brumen, M. Hölbl, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion, Ad Hoc Networks 20:96-112, 2014
    • (2014) Ad Hoc Networks , vol.20 , pp. 96-112
    • Turkanovic, M.1    Brumen, B.2    Hölbl, M.3
  • 30
    • 84880413059 scopus 로고    scopus 로고
    • Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview
    • Simone Cirani, Gianluigi Ferrari, and Luca Veltri, "Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview", Algorithms 2013, 6, 197-226
    • (2013) Algorithms , vol.6 , pp. 197-226
    • Cirani, S.1    Ferrari, G.2    Veltri, L.3
  • 32
    • 84888580916 scopus 로고    scopus 로고
    • Cyber security issues imposed on nuclear power plants
    • Do-Yeon Kim, "Cyber security issues imposed on nuclear power plants", Annals of Nuclear Energy, Volume 65, 2014, pp. 141-143, 2014
    • (2014) Annals of Nuclear Energy , vol.65 , Issue.2014 , pp. 141-143
    • Kim, D.1
  • 33
    • 84975490880 scopus 로고    scopus 로고
    • HP Whitepaper retrieved in Aug
    • HP Whitepaper retrieved in Aug 2015 http://go.saas.hp.com/fod/internet-of-things
    • (2015)
  • 34
    • 84876109205 scopus 로고    scopus 로고
    • Stuxnet: What has changed
    • D. E. Denning, "Stuxnet: What Has Changed", Future Internet, vol.4 pp. 672-687, 2012
    • (2012) Future Internet , vol.4 , pp. 672-687
    • Denning, D.E.1
  • 35
    • 84857170643 scopus 로고    scopus 로고
    • Srinivasan Statistical based intrusion detection framework using six sigma techniques
    • SAP Kumar, A Kumar, S Srinivasan Statistical based intrusion detection framework using six sigma techniques, IJCSNS 7 (10), 333, 2007
    • (2007) IJCSNS , vol.7 , Issue.10 , pp. 333
    • Kumar, S.1    Kumar S, A.2
  • 36
    • 84975509828 scopus 로고    scopus 로고
    • Intrusion Recovery Framework for Tactical Mobile Ad hoc Networks, SP Alampalayam, S Srinivasan
    • Intrusion Recovery Framework for Tactical Mobile Ad hoc Networks, SP Alampalayam, S Srinivasan The International Journal of Computer Science and Network Security 9 (9), 1-1, 2009
    • (2009) The International Journal of Computer Science and Network Security , vol.9 , Issue.9 , pp. 1
  • 37
    • 84975487112 scopus 로고    scopus 로고
    • Control Framework for Secure Cloud Computing H Srivastava, SA Kumar
    • Control Framework for Secure Cloud Computing H Srivastava, SA Kumar Journal of Information Security 6 (01), 12, 2014
    • (2014) Journal of Information Security , vol.6 , Issue.1 , pp. 12


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.