-
1
-
-
85018187721
-
-
IDC
-
IDC, http://www.idc.com/getdoc.jsp?containerId=prUS25658015
-
-
-
-
2
-
-
84959857890
-
-
IEEE Access, August
-
P. Porambage, A. Braeken, C. Schmitt, A. Gurtov, M. Ylianttila, B. Stiller, "Group key establishment for enabling secure multicast communication in wireless sensor network deployed for IoT Applications", IEEE Access, vol. 3, pp. 1503-1511, August 2015
-
(2015)
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Network Deployed for IoT Applications
, vol.3
, pp. 1503-1511
-
-
Porambage, P.1
Braeken, A.2
Schmitt, C.3
Gurtov, A.4
Ylianttila, M.5
Stiller, B.6
-
3
-
-
85018161301
-
-
CISCO
-
CISCO, http://www.cisco.com/c/en/us/solutions/internet-ofthings/overview.html
-
-
-
-
4
-
-
85018170625
-
-
IETF
-
IETF, https://tools.ietf.org/wg/6lowpan/
-
-
-
-
5
-
-
84942523308
-
Emerging security threats and countermeasures in IoT
-
April
-
Z.K. Zhang, M. C. Y. Cho, S. Shieh, IEEE Fellow, "Emerging security threats and countermeasures in IoT", ACM Symposium on Inform Ation, Computer and Communications Security (ASIACCS) Singapore, pp. 1-6, April 2015
-
(2015)
ACM Symposium on Inform Ation, Computer and Communications Security (ASIACCS) Singapore
, pp. 1-6
-
-
Zhang, Z.K.1
Cho, M.C.Y.2
Shieh, S.3
-
6
-
-
84960420501
-
Lightweight CoAP-based bootstrapping service for the internet of things
-
March
-
D. Garcia-Carrillo, R. Marin-Lopez, "Lightweight CoAP-based bootstrapping service for the internet of things", Sensors, vol. 16, pp. 358-381, March 2016
-
(2016)
Sensors
, vol.16
, pp. 358-381
-
-
Garcia-Carrillo, D.1
Marin-Lopez, R.2
-
7
-
-
84919372488
-
Security, privacy and trust in internet of things: The road ahead
-
January
-
S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini, "Security, privacy and trust in internet of things: The road ahead", Computer Networks, vol. 76, pp. 146-164, January 2015
-
(2015)
Computer Networks
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.A.3
Coen-Porisini, A.4
-
8
-
-
84920514918
-
IoT security: Ongoing challenges and research opportunities
-
Matsue, Japan, November
-
Z.K. Zhang, M. C. Y. Cho, C.W. Wang, C.W. Hsu, C.K. Chen, S. Shieh, "IoT security: ongoing challenges and research opportunities", Service-Oriented Computing and Applications (SOCA), Matsue, Japan, pp. 230-234, November 2014
-
(2014)
Service-Oriented Computing and Applications (SOCA)
, pp. 230-234
-
-
Zhang, Z.K.1
Cho, M.C.Y.2
Wang, C.W.3
Hsu, C.W.4
Chen, C.K.5
Shieh, S.6
-
9
-
-
84919978088
-
-
BodyNets, Oslo, Norway, September
-
D. Rotondi, S. Piccione, "Managing access control for things: a capability based approach", BodyNets, Oslo, Norway, pp. 263-268, September 2012
-
(2012)
Managing Access Control for Things: A Capability Based Approach
, pp. 263-268
-
-
Rotondi, D.1
Piccione, S.2
-
11
-
-
84940984266
-
-
OASIS
-
OASIS, MQTT Version 3.1.1, http://docs.oasisopen.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.html, 2014
-
(2014)
MQTT Version 3.1.1
-
-
-
13
-
-
84893462100
-
Construction and strategies in IoT security system
-
Physical and Social Computing (CPSCom) China, August
-
Q. Gou, L. Yan, Y. Liu, Y. Li, "Construction and strategies in IoT security system", Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing (CPSCom) China, pp. 1129-1132, August 2013
-
(2013)
Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (IThings/CPSCom), IEEE International Conference on and IEEE Cyber
, pp. 1129-1132
-
-
Gou, Q.1
Yan, L.2
Liu, Y.3
Li, Y.4
-
14
-
-
84883314073
-
Lithe: Lightweight secure CoAP for the internet of things
-
October
-
S. Raza, H. Shafagh, K. Hewage, R. Hummen, T. Voigt, "Lithe: lightweight secure CoAP for the internet of things", IEEE Sensors Journal, vol. 13, pp. 3711-3720, October 2013
-
(2013)
IEEE Sensors Journal
, vol.13
, pp. 3711-3720
-
-
Raza, S.1
Shafagh, H.2
Hewage, K.3
Hummen, R.4
Voigt, T.5
-
15
-
-
84873426135
-
-
Wireless Personal Multimedia Communications (WPMC) Taiwan, September
-
P. N. Mahalle, B. Anggorojati, N. R. Prasad, R. Prasad, "Identity establishment and capability based access control (IECAC) scheme for internet of things", Wireless Personal Multimedia Communications (WPMC) Taiwan, pp. 87-191, September 2012
-
(2012)
Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things
, pp. 87-191
-
-
Mahalle, P.N.1
Anggorojati, B.2
Prasad, N.R.3
Prasad, R.4
-
16
-
-
84873450504
-
-
Wireless Personal Multimedia Communications (WPMC) Taiwan, September
-
B. Anggorojati, P. N. Mahalle, N. R. Prasad, R. Prasad, "Capabilitybased access control delegation model on the federated IoT network", Wireless Personal Multimedia Communications (WPMC) Taiwan, pp. 604-608, September 2012
-
(2012)
Capabilitybased Access Control Delegation Model on the Federated IoT Network
, pp. 604-608
-
-
Anggorojati, B.1
Mahalle, P.N.2
Prasad, N.R.3
Prasad, R.4
-
17
-
-
84903851734
-
A lightweight authentication protocol for internet of things
-
May
-
J.-Y. Lee, W.-C. Lin, Y.-H. Huang, "A lightweight authentication protocol for internet of things", International Symposium on Next-Generation Electronics Taiwan, pp. 1-2, May 2014
-
(2014)
International Symposium on Next-Generation Electronics Taiwan
, pp. 1-2
-
-
Lee, J.-Y.1
Lin, W.-C.2
Huang, Y.-H.3
-
18
-
-
77957599265
-
-
1th ed., Berlin: Springer-Verlag
-
S. Babar, P. Mahalle, A. Stango, N. Prasad, R. Prasad, Proposed security model and threat taxonomy for the internet of things (IoT), 1th ed., vol. 89, Berlin: Springer-Verlag, 2010, pp.420-429
-
(2010)
Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
, vol.89
, pp. 420-429
-
-
Babar, S.1
Mahalle, P.2
Stango, A.3
Prasad, N.4
Prasad, R.5
-
19
-
-
85018165112
-
Internet of things software platforms technology trends
-
October
-
S.G. Hong, H. Lee, J.C. Choi, M.N. Bae, K.B. Lee, "Internet of things software platforms technology trends", Electronics and Telecommunications Trends, vol.30, pp. 39-48, October 2015
-
(2015)
Electronics and Telecommunications Trends
, vol.30
, pp. 39-48
-
-
Hong, S.G.1
Lee, H.2
Choi, J.C.3
Bae, M.N.4
Lee, K.B.5
-
20
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
July
-
R. Roman, J. Zhou, J. Lopez, "On the features and challenges of security and privacy in distributed internet of things", Computer Networks, vol.57, pp. 2266-2279, July 2013
-
(2013)
Computer Networks
, vol.57
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
22
-
-
84963807292
-
Threats analysis, requirements and considerations for secure internet of things
-
December
-
Y.J. Lee, D.H. Kim, "Threats analysis, requirements and considerations for secure internet of things", International Journal of Smart Home, vol. 9, pp. 191-198, December 2015
-
(2015)
International Journal of Smart Home
, vol.9
, pp. 191-198
-
-
Lee, Y.J.1
Kim, D.H.2
-
24
-
-
84929253955
-
SecIoT: A security framework for the internet of things
-
May
-
X. Huang, P. Craig, H. Lin, Z. Yan, "SecIoT: a security framework for the internet of things", Security and communication networks, DOI: 10.1002/sec.1259 May 2015
-
(2015)
Security and Communication Networks
-
-
Huang, X.1
Craig, P.2
Lin, H.3
Yan, Z.4
-
26
-
-
84980315379
-
A study on device security in IoT convergence
-
May
-
H.-J. Kim, H.-S. Chang, J.-J. Suh, T.-S. Shon, "A study on device security in IoT convergence", Industrial Engineering, Management Science and Application (ICIMSA) South Korea, pp. 1-4, May 2016
-
(2016)
Industrial Engineering, Management Science and Application (ICIMSA) South Korea
, pp. 1-4
-
-
Kim, H.-J.1
Chang, H.-S.2
Suh, J.-J.3
Shon, T.-S.4
-
27
-
-
84961579337
-
The internet of things: A security point of view
-
April
-
S. Li, T. Tryfonas, H. Li, "The internet of things: a security point of view", Internet Research, vol. 26, pp. 337-359, April 2016
-
(2016)
Internet Research
, vol.26
, pp. 337-359
-
-
Li, S.1
Tryfonas, T.2
Li, H.3
-
28
-
-
84976500178
-
Securing sensor to cloud ecosystem using internet of things (IoT) security framework
-
United Kingdom, March
-
A. F. A. Rahman, M. Daud, M. Z. Mohamad, "Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework", ICC (International Conference on Internet of things and Cloud Computing), United Kingdom, Article No.: 79, March 2016
-
(2016)
ICC (International Conference on Internet of Things and Cloud Computing)
-
-
Rahman, A.F.A.1
Daud, M.2
Mohamad, M.Z.3
-
29
-
-
84863233964
-
An identity-based personal location system with protected privacy in IoT
-
October
-
C. Hu, J. Zhang, Q. Wen, "An identity-based personal location system with protected privacy in IoT", IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT) China, pp. 192-195, October 2011
-
(2011)
IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT) China
, pp. 192-195
-
-
Hu, C.1
Zhang, J.2
Wen, Q.3
|