메뉴 건너뛰기




Volumn 66, Issue , 2016, Pages 198-213

Secure routing for internet of things: A survey

Author keywords

6LoWPAN; IEEE 802.15.4; IETF; IoT; Routing; RPL; Security; Sensors

Indexed keywords

CELLULAR TELEPHONE SYSTEMS; INTERNET; SENSOR NODES; SENSORS; STANDARDS; SURVEYS;

EID: 84978319564     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2016.03.006     Document Type: Article
Times cited : (286)

References (116)
  • 2
    • 84907325856 scopus 로고    scopus 로고
    • Optimal and secure protocols in the IETF 6TiSCH communication stack
    • N. Accettura, and G. Piro Optimal and secure protocols in the IETF 6TiSCH communication stack Ind. Electron. (ISIE) IEEE 23rd Int. Symp. 2014 1469 1474
    • (2014) Ind. Electron. (ISIE) IEEE 23rd Int. Symp. , pp. 1469-1474
    • Accettura, N.1    Piro, G.2
  • 3
    • 84994405759 scopus 로고    scopus 로고
    • An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing
    • Ontario, Canada
    • D. Airehrour, and J. Gutierrez An analysis of secure MANET routing features to maintain confidentiality and integrity in IoT routing Ontario, Canada CONF-IRM 2015 2015
    • (2015) CONF-IRM 2015
    • Airehrour, D.1    Gutierrez, J.2
  • 6
    • 84883406171 scopus 로고    scopus 로고
    • The impact of rank attack on network topology of routing protocol for low-power and lossy networks
    • L. Anhtuan, J. Loo, A. Lasebae, A. Vinel, C. Yue, and M. Chai The impact of rank attack on network topology of routing protocol for low-power and lossy networks Sens. J. IEEE 13 2013 3685 3692
    • (2013) Sens. J. IEEE , vol.13 , pp. 3685-3692
    • Anhtuan, L.1    Loo, J.2    Lasebae, A.3    Vinel, A.4    Yue, C.5    Chai, M.6
  • 7
    • 84878641061 scopus 로고    scopus 로고
    • Two-way acknowledgment-based trust framework for wireless sensor networks
    • X. Anita, J. Martin Leo Manickam, and M.A. Bhagyaveni Two-way acknowledgment-based trust framework for wireless sensor networks Int J. Distrib. Sens. Netw. 2013 2013 14
    • (2013) Int J. Distrib. Sens. Netw. , vol.2013 , pp. 14
    • Anita, X.1    Manickam, J.M.L.2    Bhagyaveni, M.A.3
  • 8
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito The internet of things: a survey Comput. Netw. 54 2010 2787 2805
    • (2010) Comput. Netw. , vol.54 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 11
    • 84919359535 scopus 로고    scopus 로고
    • A lightweight trust management based on Bayesian and Entropy for wireless sensor networks
    • S. Che, R. Feng, X. Liang, and X. Wang A lightweight trust management based on Bayesian and Entropy for wireless sensor networks Secur Commun Netw vol. 8 2015 168 175
    • (2015) Secur Commun Netw , vol.8 , pp. 168-175
    • Che, S.1    Feng, R.2    Liang, X.3    Wang, X.4
  • 12
    • 77958063894 scopus 로고    scopus 로고
    • Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks
    • M. Cheng, G. Xuan, and C. Lin Joint routing and link rate allocation under bandwidth and energy constraints in sensor networks IEEE Trans. Wirel. Commun. 8 2009 3770 3779
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , pp. 3770-3779
    • Cheng, M.1    Xuan, G.2    Lin, C.3
  • 16
  • 18
    • 84923224400 scopus 로고    scopus 로고
    • An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications
    • J. Duan, D. Gao, D. Yang, C.H. Foh, and H.-H. Chen An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications IEEE Internet Things J. 1 2014 58 69
    • (2014) IEEE Internet Things J. , vol.1 , pp. 58-69
    • Duan, J.1    Gao, D.2    Yang, D.3    Foh, C.H.4    Chen, H.-H.5
  • 20
    • 84969158272 scopus 로고    scopus 로고
    • December 2
    • Ericsson. (2011, December 2, 2014). More than 50 billion connected devices: Driving forces. Available: 'http://www.akos-rs.si/files/Telekomunikacije/Digitalna-agenda/Internetni-protokol-Ipv6/More-than-50-billion-connected-devices.pdf'
    • (2011) More Than 50 Billion Connected Devices: Driving Forces
    • Ericsson1
  • 22
    • 84911882720 scopus 로고    scopus 로고
    • An incentive mechanism based on game theory for trust management
    • R. Feng, S. Che, X. Wang, and J. Wan An incentive mechanism based on game theory for trust management Secur Commun Netw vol. 7 2014 2318 2325
    • (2014) Secur Commun Netw , vol.7 , pp. 2318-2325
    • Feng, R.1    Che, S.2    Wang, X.3    Wan, J.4
  • 23
    • 84908649230 scopus 로고    scopus 로고
    • Study on sinkhole attacks in wireless Ad hoc networks
    • Gagandeep, and Aashima Study on sinkhole attacks in wireless Ad hoc networks Int J. Comput. Sci. Eng. (IJCSE) 4 2012 1078 1084
    • (2012) Int J. Comput. Sci. Eng. (IJCSE) , vol.4 , pp. 1078-1084
    • Gagandeep1    Aashima2
  • 24
  • 25
    • 84918542426 scopus 로고    scopus 로고
    • BeTrust: A dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks
    • Y. Gao, and W. Liu BeTrust: a dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks J. Sens. 2014 2014 1 10
    • (2014) J. Sens. , vol.2014 , pp. 1-10
    • Gao, Y.1    Liu, W.2
  • 26
    • 84945296761 scopus 로고    scopus 로고
    • Taxonomy and Holistic Detection of Security Attacks in MANETs
    • S. Khan, J. Lloret Mauri, editors. Auerbach Publications Boca Raton, FL
    • P. García-Teodoro, L. Sánchez-Casado, and G. Maciá-Fernández Taxonomy and Holistic Detection of Security Attacks in MANETs S. Khan, J. Lloret Mauri, editors. Security for multihop wireless networks 2014 Auerbach Publications Boca Raton, FL 3 11
    • (2014) Security for Multihop Wireless Networks , pp. 3-11
    • García-Teodoro, P.1    Sánchez-Casado, L.2    Maciá-Fernández, G.3
  • 29
    • 84911987280 scopus 로고    scopus 로고
    • Network-layer security for the Internet of Things using TinyOS and BLIP
    • J. Granjal, E. Monteiro, and J.S. Silva Network-layer security for the Internet of Things using TinyOS and BLIP Int Journal Commun Syst vol. 27 2014 1938 1963
    • (2014) Int Journal Commun Syst , vol.27 , pp. 1938-1963
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 31
    • 84878505783 scopus 로고    scopus 로고
    • ESWC: Efficient scheduling for the mobile sink in wireless sensor networks with delay constraint
    • Y. Gu, Y. Ji, J. Li, and B. Zhao ESWC: efficient scheduling for the mobile sink in wireless sensor networks with delay constraint IEEE Trans Parallel Distrib Syst 24 2013 1310 1320
    • (2013) IEEE Trans Parallel Distrib Syst , vol.24 , pp. 1310-1320
    • Gu, Y.1    Ji, Y.2    Li, J.3    Zhao, B.4
  • 32
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami Internet of Things (IoT): a vision, architectural elements, and future directions Future Gener Comput Syst 29 2013 1645 1660
    • (2013) Future Gener Comput Syst , vol.29 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 36
    • 84908448624 scopus 로고    scopus 로고
    • Security protocols and privacy issues into 6LoWPAN stack: A synthesis
    • C. Hennebert, and J. Dos Santos Security protocols and privacy issues into 6LoWPAN stack: a synthesis Internet Things J. IEEE 1 2014 384 398
    • (2014) Internet Things J. IEEE , vol.1 , pp. 384-398
    • Hennebert, C.1    Dos Santos, J.2
  • 37
    • 1542317831 scopus 로고    scopus 로고
    • Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
    • Y. Hu, A. Perrig, and D. Johnson Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ACM Workshop Wirel Secur (WiSe) 2003 30 40
    • (2003) ACM Workshop Wirel Secur (WiSe) , pp. 30-40
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 40
    • 84994392828 scopus 로고    scopus 로고
    • December, 2014, December 1
    • Internet Engineering Task Force (IETF). (December, 2014, December 1, 2014). IPv6 over the TSCH mode of IEEE 802.15.4e (6tisch). Available: 'https://datatracker.ietf.org/wg/6tisch/charter/'
    • (2014) IPv6 over the TSCH Mode of IEEE 802.15.4e (6tisch)
  • 42
    • 84923044561 scopus 로고    scopus 로고
    • Security Issues in Mobile Ad Hoc Network
    • ed S. Khan, A.-S.K. Pathan, editors. Springer-Verlag Berlin Heidelberg Heidelberg, Germany
    • N. Islam, and Z.A. Shaikh Security Issues in Mobile Ad Hoc Network ed S. Khan, A.-S.K. Pathan, editors. Wireless Networks and Security: Issues, Challenges and Research Trends 2013 Springer-Verlag Berlin Heidelberg Heidelberg, Germany 49 56
    • (2013) Wireless Networks and Security: Issues, Challenges and Research Trends , pp. 49-56
    • Islam, N.1    Shaikh, Z.A.2
  • 50
    • 84861362789 scopus 로고    scopus 로고
    • Optimal function computation in directed and undirected graphs
    • H. Kowshik, and P.R. Kumar Optimal function computation in directed and undirected graphs IEEE Trans. Inf. Theory 58 2012 3407 3418
    • (2012) IEEE Trans. Inf. Theory , vol.58 , pp. 3407-3418
    • Kowshik, H.1    Kumar, P.R.2
  • 51
    • 85152513247 scopus 로고    scopus 로고
    • 6LoWPAN security: Adding compromise resilience to the 802.15.4 security sublayer Zurich, Switzerland
    • Krentz, K.-F., Rafiee, H., Meinel, C., 2013. 6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer Zurich, Switzerland. Present Proc Int Workshop Adapt Secur.
    • (2013) Present Proc Int Workshop Adapt Secur
    • Krentz, K.-F.1    Rafiee, H.2    Meinel, C.3
  • 52
    • 84865658341 scopus 로고    scopus 로고
    • 6LoWPAN: A study on QoS security threats and countermeasures using intrusion detection system approach
    • A. Le, J. Loo, A. Lasebae, M. Aiash, and Y. Luo 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach Int. J. Commun. Syst. 25 2012 1189 1212
    • (2012) Int. J. Commun. Syst. , vol.25 , pp. 1189-1212
    • Le, A.1    Loo, J.2    Lasebae, A.3    Aiash, M.4    Luo, Y.5
  • 53
    • 84881125351 scopus 로고    scopus 로고
    • Minimum-cost sensor placement for required lifetime in wireless sensor-target surveillance networks
    • H. Liu, X. Chu, Y.-W. Leung, and R. Du Minimum-cost sensor placement for required lifetime in wireless sensor-target surveillance networks IEEE Trans. Parallel. Distrib. Syst. 24 2013 1783 1796
    • (2013) IEEE Trans. Parallel. Distrib. Syst. , vol.24 , pp. 1783-1796
    • Liu, H.1    Chu, X.2    Leung, Y.-W.3    Du, R.4
  • 54
    • 84875152554 scopus 로고    scopus 로고
    • A routing protocol based on energy and link quality for Internet of Things applications
    • Basel Switzerland
    • K. Machado, D. Rosário, E. Cerqueira, A.A.F. Loureiro, A. Neto, and J.N. d Souza A routing protocol based on energy and link quality for Internet of Things applications Sensors 13 2013 Basel Switzerland 1942 1964
    • (2013) Sensors , vol.13 , pp. 1942-1964
    • Machado, K.1    Rosário, D.2    Cerqueira, E.3    Loureiro, A.A.F.4    Neto, A.5    Souza, J.N.D.6
  • 56
    • 84994407706 scopus 로고    scopus 로고
    • September 13, 2014
    • Mc Afee Labs. (2014, September 13, 2014). 2013 Threats Predictions. Available: 'http://www.mcafee.com/us/resources/reports/rp-threat-predictions-2013.pdf'
    • (2014) 2013 Threats Predictions
  • 57
    • 33646163685 scopus 로고    scopus 로고
    • Heidelberg: Springer Berlin Heidelberg Berlin
    • D. Melaye, and Y. Demazeau Bayesian Dynamic Trust Model vol. 3690 2005 Heidelberg: Springer Berlin Heidelberg Berlin 480 489
    • (2005) Bayesian Dynamic Trust Model , vol.3690 , pp. 480-489
    • Melaye, D.1    Demazeau, Y.2
  • 58
    • 19944366933 scopus 로고    scopus 로고
    • A MAC protocol to reduce sensor network energy consumption using a wakeup radio
    • M.J. Miller, and N.H. Vaidya A MAC protocol to reduce sensor network energy consumption using a wakeup radio IEEE Trans Mob Comput 4 2005 228 242
    • (2005) IEEE Trans Mob Comput , vol.4 , pp. 228-242
    • Miller, M.J.1    Vaidya, N.H.2
  • 64
    • 44949276843 scopus 로고
    • Restating the foundation of information security
    • D.B. Parker Restating the foundation of information security Comput Audit Update 1991 1991 2 15
    • (1991) Comput Audit Update , vol.1991 , pp. 2-15
    • Parker, D.B.1
  • 66
    • 33748469604 scopus 로고    scopus 로고
    • ed. Florida Atlantic University S. Huang, D. MacCallum, D.Z. Du, editors. Springer Boca Raton, FL
    • M.O. Pervaiz, M. Cardei, and J. Wu Routing Security in Ad Hoc Wireless Networks ed. Florida Atlantic University S. Huang, D. MacCallum, D.Z. Du, editors. 2005 Springer Boca Raton, FL
    • (2005) Routing Security in Ad Hoc Wireless Networks
    • Pervaiz, M.O.1    Cardei, M.2    Wu, J.3
  • 68
    • 84901931524 scopus 로고    scopus 로고
    • Effective neural network-based node localisation scheme for wireless sensor networks
    • C. Po-Jen, and J. Yi-Jun Effective neural network-based node localisation scheme for wireless sensor networks Wirel. Sens. Syst. IET 4 2014 97 103
    • (2014) Wirel. Sens. Syst. IET , vol.4 , pp. 97-103
    • Po-Jen, C.1    Yi-Jun, J.2
  • 71
    • 84867766892 scopus 로고    scopus 로고
    • Secure communication for the Internet of Things - A comparison of link-layer security and IPsec for 6LoWPAN
    • S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN Secur. Commun Netw. 2012
    • (2012) Secur. Commun Netw.
    • Raza, S.1    Duquennoy, S.2    Höglund, J.3    Roedig, U.4    Voigt, T.5
  • 72
    • 84911865485 scopus 로고    scopus 로고
    • Secure communication for the Internet of Things - A comparison of link-layer security and IPsec for 6LoWPAN
    • S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN Secur. Commun Netw. 7 2014 2654 2668
    • (2014) Secur. Commun Netw. , vol.7 , pp. 2654-2668
    • Raza, S.1    Duquennoy, S.2    Höglund, J.3    Roedig, U.4    Voigt, T.5
  • 76
    • 79955712919 scopus 로고    scopus 로고
    • Key management systems for sensor networks in the context of the Internet of Things
    • R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos Key management systems for sensor networks in the context of the Internet of Things Comput Electr Eng 37 2011 147 159
    • (2011) Comput Electr Eng , vol.37 , pp. 147-159
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3    Sklavos, N.4
  • 78
    • 84899995793 scopus 로고    scopus 로고
    • Energy-efficient probabilistic routing algorithm for internet of things
    • P. Sang-Hyun, C. Seungryong, and L. Jung-Ryun Energy-efficient probabilistic routing algorithm for internet of things J. Appl Math 2014 2014
    • (2014) J. Appl Math , vol.2014
    • Sang-Hyun, P.1    Seungryong, C.2    Jung-Ryun, L.3
  • 85
    • 84655170952 scopus 로고    scopus 로고
    • Cross-layer optimization of correlated data gathering in wireless sensor networks
    • H. Shibo, C. Jiming, D.K.Y. Yau, and S. Youxian Cross-layer optimization of correlated data gathering in wireless sensor networks IEEE Trans. Mob. Comput. 11 2012 1678 1691
    • (2012) IEEE Trans. Mob. Comput. , vol.11 , pp. 1678-1691
    • Shibo, H.1    Jiming, C.2    Yau, D.K.Y.3    Youxian, S.4
  • 87
    • 79961235838 scopus 로고    scopus 로고
    • Hello flood attack and its countermeasures in wireless sensor networks
    • V.P. Singh, S. Jain, and J. Singhai Hello flood attack and its countermeasures in wireless sensor networks Int. J. Comput. Sci. Issues (IJCSI) 7 2010 23 27
    • (2010) Int. J. Comput. Sci. Issues (IJCSI) , vol.7 , pp. 23-27
    • Singh, V.P.1    Jain, S.2    Singhai, J.3
  • 89
    • 84893447745 scopus 로고    scopus 로고
    • 13.09.14
    • Sophos Limited, 2013. Security Threat Report 2013. 1.13. (13.09.14) Available: 'https://www.sophos.com/de-de/medialibrary/PDFs/other/sophossecuritythreatreport2013.pdf'
    • (2013) Security Threat Report 2013 , pp. 113
  • 90
    • 84922515896 scopus 로고    scopus 로고
    • Sophos Limited, 2014. Security Threat Report. 2-22. Available: 'http://www.sophos.com/en-us/medialibrary/PDFs/other/sophos-security-threat-report-2014.pdf'
    • (2014) Security Threat Report , pp. 2-22
  • 91
    • 84994391658 scopus 로고    scopus 로고
    • Entropy Trust based Approach against IP spoofing attacks in network
    • B. Sovan, and G. Arnab Entropy Trust based Approach against IP spoofing attacks in network Int Journal Comput Appl 67 2013
    • (2013) Int Journal Comput Appl , vol.67
    • Sovan, B.1    Arnab, G.2
  • 92
    • 84994392792 scopus 로고    scopus 로고
    • November 25
    • Spansion. (2014, November 25). ZigBee mesh networks. Available: 'http://core.spansion.com/article/contextual-computing-simplifies-iot/#.VG5sfskXJ8E'
    • (2014) ZigBee Mesh Networks
  • 93
    • 84925325341 scopus 로고    scopus 로고
    • Weighted voting based trust management for intrusion tolerance in heterogeneous wireless sensor networks
    • P. Swaruba, and V.R. Ganesh Weighted voting based trust management for intrusion tolerance in heterogeneous wireless sensor networks Int. Conf. Inf. Commun. Embed Syst. (ICICES) 2014 1 7
    • (2014) Int. Conf. Inf. Commun. Embed Syst. (ICICES) , pp. 1-7
    • Swaruba, P.1    Ganesh, V.R.2
  • 99
    • 84884229742 scopus 로고    scopus 로고
    • Routing attacks and countermeasures in the RPL-based internet of things
    • L. Wallgren, S. Raza, and T. Voigt Routing attacks and countermeasures in the RPL-based internet of things Int. J. Distrib. Sens. Netw. 2013 2013 11
    • (2013) Int. J. Distrib. Sens. Netw. , vol.2013 , pp. 11
    • Wallgren, L.1    Raza, S.2    Voigt, T.3
  • 101
    • 79957785921 scopus 로고    scopus 로고
    • Information potential fields navigation in wireless Ad-Hoc sensor networks
    • W. Wei, and Y. Qi Information potential fields navigation in wireless Ad-Hoc sensor networks Sensors 11 2011 4794
    • (2011) Sensors , vol.11 , pp. 4794
    • Wei, W.1    Qi, Y.2
  • 103
    • 84911967925 scopus 로고    scopus 로고
    • GI/Geom/1 queue based on communication model for mesh networks
    • W. Wei, Q. Xu, L. Wang, X.H. Hei, P. Shen, W. Shi, and et al. GI/Geom/1 queue based on communication model for mesh networks Int J. Commun. Syst. 27 2014 3013 3029
    • (2014) Int J. Commun. Syst. , vol.27 , pp. 3013-3029
    • Wei, W.1    Xu, Q.2    Wang, L.3    Hei, X.H.4    Shen, P.5    Shi, W.6
  • 104
    • 84946687086 scopus 로고    scopus 로고
    • Routing in wireless sensor network using artificial bee colony algorithm
    • Z. Wei, and L. Di Routing in wireless sensor network using artificial bee colony algorithm Int. Conf. Wirel. Commun. Sens. Netw. (WCSN) 2014 280 284
    • (2014) Int. Conf. Wirel. Commun. Sens. Netw. (WCSN) , pp. 280-284
    • Wei, Z.1    Di, L.2
  • 105
    • 36849010124 scopus 로고    scopus 로고
    • A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks
    • Y. Xiao, X.S. Shen, D.-Z. Du, editors. Springer Science
    • B. Wu, J. Chen, J. Wu, and M. Cardei A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks Y. Xiao, X.S. Shen, D.-Z. Du, editors. Wireless Network Security 2007 Springer Science 110 132
    • (2007) Wireless Network Security , pp. 110-132
    • Wu, B.1    Chen, J.2    Wu, J.3    Cardei, M.4
  • 107
    • 84994391453 scopus 로고    scopus 로고
    • Markov chain based trust management scheme for wireless sensor networks
    • L. Xiaolong, and F. Donglei Markov chain based trust management scheme for wireless sensor networks J. Netw. 9 2014 3263
    • (2014) J. Netw. , vol.9 , pp. 3263
    • Xiaolong, L.1    Donglei, F.2
  • 109
    • 84873995938 scopus 로고    scopus 로고
    • Random walks and green's function on digraphs: A framework for estimating wireless transmission costs
    • L. Yanhua, and Z. Zhi-Li Random walks and green's function on digraphs: a framework for estimating wireless transmission costs Netw. IEEE/ACM Trans. 21 2013 135 148
    • (2013) Netw. IEEE/ACM Trans. , vol.21 , pp. 135-148
    • Yanhua, L.1    Zhi-Li, Z.2
  • 111
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for Ad Hoc networks
    • H. Yih-Chun, P. Adrian, and B.J. David Ariadne: a secure on-demand routing protocol for Ad Hoc networks Wirel. Netw. 11 2005 21
    • (2005) Wirel. Netw. , vol.11 , pp. 21
    • Yih-Chun, H.1    Adrian, P.2    David, B.J.3
  • 112
    • 84941662653 scopus 로고    scopus 로고
    • Recent advances of ICT convergence on wsn applications
    • M. Yoo, F. Wu, and C. Qiao Recent advances of ICT convergence on wsn applications Int. J. Distrib. Sens. Netw. 2015 2015 3
    • (2015) Int. J. Distrib. Sens. Netw. , vol.2015 , pp. 3
    • Yoo, M.1    Wu, F.2    Qiao, C.3
  • 115
    • 84908454906 scopus 로고    scopus 로고
    • Sybil attacks and their defenses in the internet of things
    • K. Zhang, X. Liang, R. Lu, and X. Shen Sybil attacks and their defenses in the internet of things Internet Things J. IEEE 1 2014 372 383
    • (2014) Internet Things J. IEEE , vol.1 , pp. 372-383
    • Zhang, K.1    Liang, X.2    Lu, R.3    Shen, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.