메뉴 건너뛰기




Volumn 29, Issue 4, 2018, Pages

Anomaly behavior analysis for IoT sensors

Author keywords

[No Author keywords available]

Indexed keywords

COST EFFECTIVENESS; FOG COMPUTING; INFORMATION SERVICES; INTRUSION DETECTION; NETWORK SECURITY;

EID: 85018983412     PISSN: 21615748     EISSN: 21613915     Source Type: Journal    
DOI: 10.1002/ett.3188     Document Type: Article
Times cited : (59)

References (37)
  • 5
    • 85045079443 scopus 로고    scopus 로고
    • Accessed April
    • Legezo D. How to trick traffic sensors. Kaspersky Lab. https://securelist.com/blog/research/74454/how-to-trick-traffic-sensors/. Accessed April 2016.
    • (2016) How to trick traffic sensors
    • Legezo, D.1
  • 6
    • 41249100291 scopus 로고    scopus 로고
    • A survey of security in telemedicine with wireless sensor networks
    • In, Xiao Y, Chen H, eds., Boca Raton, Florida, United States, CRC Press
    • Takahashi D, Xiao Y, Hu F. A survey of security in telemedicine with wireless sensor networks. In: Xiao Y, Chen H, eds. Mobile Telemedicine: A Computing and Networking Perspective. Boca Raton, Florida, United States: CRC Press; 2008:209-235.
    • (2008) Mobile Telemedicine: A Computing and Networking Perspective , pp. 209-235
    • Takahashi, D.1    Xiao, Y.2    Hu, F.3
  • 7
    • 84864795204 scopus 로고    scopus 로고
    • Multi-agent control system with information fusion based comfort model for smart buildings
    • Wang Z, Wang L, Dounis A, Yang R. Multi-agent control system with information fusion based comfort model for smart buildings. Appl Energy. 2012;99:247-254.
    • (2012) Appl Energy , vol.99 , pp. 247-254
    • Wang, Z.1    Wang, L.2    Dounis, A.3    Yang, R.4
  • 15
    • 84861076200 scopus 로고    scopus 로고
    • Security architecture and key technologies for IoT/CPS
    • Ding C, Yang LJ, Wu M. Security architecture and key technologies for IoT/CPS. ZTE Technology Journal. 2011;17(1):11-16.
    • (2011) ZTE Technology Journal , vol.17 , Issue.1 , pp. 11-16
    • Ding, C.1    Yang, L.J.2    Wu, M.3
  • 20
    • 84906841638 scopus 로고    scopus 로고
    • An information framework for creating a smart city through internet of things
    • Jin J, Gubbi J, Marusic S, Palaniswami M. An information framework for creating a smart city through internet of things. IEEE Internet of Things J. 2014;1(2):112-121.
    • (2014) IEEE Internet of Things J , vol.1 , Issue.2 , pp. 112-121
    • Jin, J.1    Gubbi, J.2    Marusic, S.3    Palaniswami, M.4
  • 24
    • 84973325088 scopus 로고    scopus 로고
    • Towards an analysis of security issues, challenges, and open problems in the Internet of Things
    • New York, USA
    • Hossain M, Fotouhi M, Hasan R. Towards an analysis of security issues, challenges, and open problems in the Internet of Things. Paper presented at: IEEE World Congress on Services; 2015; New York, USA.
    • (2015) IEEE World Congress on Services
    • Hossain, M.1    Fotouhi, M.2    Hasan, R.3
  • 27
    • 85035359173 scopus 로고    scopus 로고
    • Birmingham, UK, Packt Publishing Ltd
    • Mishra C. Mastering Wireshark. Birmingham, UK: Packt Publishing Ltd; 2016.
    • (2016) Mastering Wireshark
    • Mishra, C.1
  • 28
    • 0003456805 scopus 로고    scopus 로고
    • Third Edition The Sparse Way, 3rd ed, Amsterdam, Netherlands, Academic Press
    • Mallat S. A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way. 3rd ed. Amsterdam, Netherlands: Academic Press; 2008.
    • (2008) A Wavelet Tour of Signal Processing
    • Mallat, S.1
  • 30
    • 85045109065 scopus 로고    scopus 로고
    • Accessed June 2016.
    • Weka. http://weka.sourceforge.net/doc.dev/weka/classifiers/rules/JRip.html. Accessed June 2016.
  • 33
    • 84992036644 scopus 로고    scopus 로고
    • Detection of replay attacks in cyber-physical systems
    • Boston, MA
    • Hoehn A, Zhang P. Detection of replay attacks in cyber-physical systems. Paper presented at: American Control Conference (ACC); 2016; Boston, MA.
    • (2016) American Control Conference (ACC)
    • Hoehn, A.1    Zhang, P.2
  • 34
    • 84902297134 scopus 로고    scopus 로고
    • Toward a secure wireless-based home area network for metering in smart grids
    • Namboodiri V, Aravinthan V, Mohapatra S, Karimi B, Jewell W. Toward a secure wireless-based home area network for metering in smart grids. IEEE Syst J. 2013;8(2):1-12. https://doi.org/10.1109/JSYST.2013.2260700
    • (2013) IEEE Syst J , vol.8 , Issue.2 , pp. 1-12
    • Namboodiri, V.1    Aravinthan, V.2    Mohapatra, S.3    Karimi, B.4    Jewell, W.5
  • 35
    • 84893330451 scopus 로고    scopus 로고
    • A path authenticating method using bloom filters against impersonation attacks on relaying nodes for wireless sensor networks
    • Philadelphia, Pennsylvania, USA
    • Tanabe N, Kohno E, Kakuda Y. A path authenticating method using bloom filters against impersonation attacks on relaying nodes for wireless sensor networks. Paper presented at: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops; July 8, 2013; Philadelphia, Pennsylvania, USA.
    • (2013) 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops
    • Tanabe, N.1    Kohno, E.2    Kakuda, Y.3
  • 36
    • 84945392187 scopus 로고    scopus 로고
    • Detecting malicious data injections in wireless sensor networks: a survey
    • Article 24.
    • Illiano VP, Lupu E. Detecting malicious data injections in wireless sensor networks: a survey. ACM Comput Surv (CSUR). 2015;48(2): Article No. 24.
    • (2015) ACM Comput Surv (CSUR) , vol.48 , Issue.2
    • Illiano, V.P.1    Lupu, E.2
  • 37
    • 84958760322 scopus 로고    scopus 로고
    • The SDN shuffle: creating a moving-target defense using host-based software-defined networking
    • Denver, Colorado, USA
    • Mac Farland DC, Shue CA. The SDN shuffle: creating a moving-target defense using host-based software-defined networking. Paper presented at: Proceedings of the Second ACM Workshop on Moving Target Defense; October 12, 2015; Denver, Colorado, USA.
    • (2015) Proceedings of the Second ACM Workshop on Moving Target Defense
    • Mac Farland, D.C.1    Shue, C.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.