메뉴 건너뛰기




Volumn , Issue , 2016, Pages 166-175

OnboardICNg: A secure protocol for on-boarding IoT devices in ICN

Author keywords

Authentication; ICN security; Internet of things

Indexed keywords

AUTHENTICATION; ENERGY UTILIZATION; INTERNET OF THINGS; MESH NETWORKING; NETWORK SECURITY;

EID: 84994082446     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2984356.2984374     Document Type: Conference Paper
Times cited : (33)

References (35)
  • 2
    • 84893245457 scopus 로고    scopus 로고
    • Cache privacy in named-data networking
    • IEEE
    • G. Acs, M. Conti, P. Gasti, C. Ghali, and G. Tsudik. Cache privacy in named-data networking. In ICDCS, pages 41-51. IEEE, 2013.
    • (2013) ICDCS , pp. 41-51
    • Acs, G.1    Conti, M.2    Gasti, P.3    Ghali, C.4    Tsudik, G.5
  • 3
    • 84906972210 scopus 로고    scopus 로고
    • Named data networking for IoT: An architectural perspective
    • IEEE
    • M. Amadeo, C. Campolo, A. Iera, and A. Molinaro. Named data networking for IoT: An architectural perspective. In EuCNC, pages 1-5. IEEE, 2014.
    • (2014) EuCNC , pp. 1-5
    • Amadeo, M.1    Campolo, C.2    Iera, A.3    Molinaro, A.4
  • 4
    • 84988250067 scopus 로고    scopus 로고
    • Internet of things via named data networking: The support of push traffic
    • IEEE
    • M. Amadeo, C. Campolo, and A. Molinaro. Internet of Things via Named Data Networking: The support of push traffic. In NOF, pages 1-5. IEEE, 2014.
    • (2014) NOF , pp. 1-5
    • Amadeo, M.1    Campolo, C.2    Molinaro, A.3
  • 5
    • 84942303394 scopus 로고    scopus 로고
    • Information centric networking in the iot: Experiments with ndn in the wild
    • ACM
    • E. Baccelli, C. Mehlis, O. Hahm, T. C. Schmidt, and M. Wählisch. Information Centric Networking in the IoT: Experiments with NDN in the Wild. In ICN, pages 77-86. ACM, 2014.
    • (2014) ICN , pp. 77-86
    • Baccelli, E.1    Mehlis, C.2    Hahm, O.3    Schmidt, T.C.4    Wählisch, M.5
  • 6
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO, pages 232-249. Springer, 1994.
    • (1994) CRYPTO , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 62149118079 scopus 로고    scopus 로고
    • The eap-psk protocol: A pre-shared key extensible authentication protocol (eap) method
    • F. Bersani and H. Tschofenig. The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method. RFC 4764.
    • RFC 4764
    • Bersani, F.1    Tschofenig, H.2
  • 8
    • 84969335220 scopus 로고    scopus 로고
    • Securing instrumented environments over content-centric networking: The case of lighting control and NDN
    • IEEE
    • J. Burke, P. Gasti, N. Nathan, and G. Tsudik. Securing instrumented environments over content-centric networking: the case of lighting control and NDN. In INFOCOM Workshops, pages 394-398. IEEE, 2013.
    • (2013) INFOCOM Workshops , pp. 394-398
    • Burke, J.1    Gasti, P.2    Nathan, N.3    Tsudik, G.4
  • 9
    • 84911032385 scopus 로고    scopus 로고
    • Secure sensing over named data networking
    • IEEE
    • J. Burke, P. Gasti, N. Nathan, and G. Tsudik. Secure Sensing over Named Data Networking. In NCA, pages 175-180. IEEE, 2014.
    • (2014) NCA , pp. 175-180
    • Burke, J.1    Gasti, P.2    Nathan, N.3    Tsudik, G.4
  • 11
    • 77956994208 scopus 로고    scopus 로고
    • Recommendation for key derivation using pseudorandom functions
    • L. Chen. Recommendation for key derivation using pseudorandom functions. NIST special publication, 800:108, 2008.
    • (2008) NIST Special Publication, 800 , pp. 108
    • Chen, L.1
  • 12
    • 84955247359 scopus 로고    scopus 로고
    • Violating consumer anonymity: Geo-locating nodes in named data networking
    • Springer
    • A. Compagno, M. Conti, P. Gasti, L. V. Mancini, and G. Tsudik. Violating consumer anonymity: Geo-locating nodes in named data networking. In ACNS, pages 243-262. Springer, 2015.
    • (2015) ACNS , pp. 243-262
    • Compagno, A.1    Conti, M.2    Gasti, P.3    Mancini, L.V.4    Tsudik, G.5
  • 13
    • 84898024191 scopus 로고    scopus 로고
    • Poseidon: Mitigating interest flooding DDoS attacks in named data networking
    • IEEE
    • A. Compagno, M. Conti, P. Gasti, and G. Tsudik. Poseidon: Mitigating interest flooding DDoS attacks in named data networking. In LCN, pages 630-638. IEEE, 2013.
    • (2013) LCN , pp. 630-638
    • Compagno, A.1    Conti, M.2    Gasti, P.3    Tsudik, G.4
  • 15
    • 84994078831 scopus 로고    scopus 로고
    • Secure cooperative channel establishment in wireless sensor networks
    • IEEE
    • M. Conti, R. Di Pietro, and L. V. Mancini. Secure cooperative channel establishment in wireless sensor networks. In PerCom Workshops, pages 5-9. IEEE, 2006.
    • (2006) PerCom Workshops , pp. 5-9
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3
  • 16
    • 56749174919 scopus 로고    scopus 로고
    • On the energy cost of communication and cryptography in wireless sensor networks
    • IEEE
    • G. De Meulenaer, F. Gosset, F.-X. Standaert, and O. Pereira. On the energy cost of communication and cryptography in wireless sensor networks. In WiMob, pages 580-585. IEEE, 2008.
    • (2008) WiMob , pp. 580-585
    • De Meulenaer, G.1    Gosset, F.2    Standaert, F.-X.3    Pereira, O.4
  • 17
    • 0003216023 scopus 로고    scopus 로고
    • Internet protocol version 6 (ipv6) specification
    • S. E. Deering. Internet Protocol, Version 6 (IPv6) Specification. RFC 2460.
    • RFC 2460
    • Deering, S.E.1
  • 18
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • ACM
    • L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS, pages 41-47. ACM, 2002.
    • (2002) CCS , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 20
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • ACM
    • C. Karlof, N. Sastry, and D. Wagner. TinySec: a link layer security architecture for wireless sensor networks. In SenSys, pages 162-175. ACM, 2004.
    • (2004) SenSys , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 22
    • 78049298573 scopus 로고    scopus 로고
    • The price of security in wireless sensor networks
    • J. Lee, K. Kapitanova, and S. H. Son. The price of security in wireless sensor networks. Computer Networks, 54(17):2967-2978, 2010.
    • (2010) Computer Networks , vol.54 , Issue.17 , pp. 2967-2978
    • Lee, J.1    Kapitanova, K.2    Son, S.H.3
  • 23
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. TISSEC, 8(1):41-77, 2005.
    • (2005) TISSEC , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Li, R.3
  • 27
    • 84887348851 scopus 로고    scopus 로고
    • Panatiki: A network access control implementation based on PANA for IoT devices
    • P. M. Sanchez, R. M. Lopez, and A. F. G. Skarmeta. Panatiki: A network access control implementation based on PANA for IoT devices. Sensors, 13(11):14888-14917, 2013.
    • (2013) Sensors , vol.13 , Issue.11 , pp. 14888-14917
    • Sanchez, P.M.1    Lopez, R.M.2    Skarmeta, A.F.G.3
  • 28
    • 84903593560 scopus 로고    scopus 로고
    • Securing building management systems using named data networking
    • W. Shang, Q. Ding, A. Marianantoni, J. Burke, and L. Zhang. Securing building management systems using named data networking. Network, 28(3):50-56, 2014.
    • (2014) Network , vol.28 , Issue.3 , pp. 50-56
    • Shang, W.1    Ding, Q.2    Marianantoni, A.3    Burke, J.4    Zhang, L.5
  • 31
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. Computer, 35(10):54-62, 2002.
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 33
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • S. Zhu, S. Setia, and S. Jajodia. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN, 2(4):500-528, 2006.
    • (2006) TOSN , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.