메뉴 건너뛰기




Volumn , Issue , 2017, Pages 47-62

A survey on secure communication protocols for IoT systems

Author keywords

authentication; confidentiality; integrity; Internet of Things; security; standard

Indexed keywords

AUTHENTICATION; NETWORK PROTOCOLS; NETWORK SECURITY; STANDARDS;

EID: 85019913086     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SIoT.2016.012     Document Type: Conference Paper
Times cited : (83)

References (89)
  • 2
    • 84942859708 scopus 로고    scopus 로고
    • Securely making things right
    • C. Kolias, A. Stavrou, and J. Voas, "Securely making things right," Computer, vol. 48, no. 9, pp. 84-88, 2015.
    • (2015) Computer , vol.48 , Issue.9 , pp. 84-88
    • Kolias, C.1    Stavrou, A.2    Voas, J.3
  • 4
    • 84906739578 scopus 로고    scopus 로고
    • Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)
    • S. M. Sajjad and M. Yousaf, "Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)," in 2014 Conference on Information Assurance and Cyber Security (CIACS), 2014, pp. 9-14. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6861324
    • (2014) 2014 Conference on Information Assurance and Cyber Security (CIACS) , pp. 9-14
    • Sajjad, S.M.1    Yousaf, M.2
  • 5
    • 84876943063 scopus 로고    scopus 로고
    • Internet of Things (IoT): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013. [Online]. Available: http://dx.doi.org/10.1016/j.future.2013.01.010
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 9
    • 84964677884 scopus 로고    scopus 로고
    • On the security and privacy of internet of things architectures and systems
    • E. Vasilomanolakis, J. Daubert, and M. Luthra, "On the Security and Privacy of Internet of Things Architectures and Systems," in Secure Internet of Things (SIoT 2015), 2015, pp. 49-57. [Online]. Available: https://www.informatik.tu-darmstadt.de/fileadmin/user upload/Group TK/filesDownload/Published Papers/SIoTpaper.pdf
    • Secure Internet of Things (SIoT 2015) , vol.2015 , pp. 49-57
    • Vasilomanolakis, E.1    Daubert, J.2    Luthra, M.3
  • 11
    • 85000402260 scopus 로고    scopus 로고
    • Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks
    • M. Abomhara and G. M. Koien, "Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks," Journal of Cyber Security and Mobility, vol. 4, no. 1, pp. 65-88, 2015. [Online]. Available: http://www.riverpublishers.com/journal read html article.php?j=JCSM/4/1/4
    • (2015) Journal of Cyber Security and Mobility , vol.4 , Issue.1 , pp. 65-88
    • Abomhara, M.1    Koien, G.M.2
  • 15
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, 2006. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=4109893
    • (2006) IEEE Communications Surveys & Tutorials , vol.8 , Issue.2 , pp. 2-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 18
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in Internet of Things: The road ahead
    • S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer Networks, vol. 76, pp. 146-164, 2015. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2014. 11.008
    • (2015) Computer Networks , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.A.3    Coen-Porisini, A.4
  • 20
    • 78649989557 scopus 로고    scopus 로고
    • A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
    • http://dud. inf.tu-dresden.de/literatur/Anon Terminology v0.34.pdf
    • A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management," Tech. Rep., 2009. [Online]. Available: http://dud.inf.tu-dresden.de/Anon Terminology.shtml\delimiter"026E30Fnhttp://dud. inf.tu-dresden.de/literatur/Anon Terminology v0.34.pdf
    • (2009) Tech. Rep.
    • Pfitzmann, A.1    Hansen, M.2
  • 21
  • 24
    • 84871965024 scopus 로고    scopus 로고
    • 2.4 GHz Texas Instruments, Dallas, USA
    • "2.4 GHz IEEE 802.15.4 /ZigBee-ready RF Transceiver (CC2420)," Texas Instruments, Dallas, USA. [Online]. Available: http://www.ti.com/lit/ds/symlink/cc2420.pdf
    • IEEE 802.15.4 /ZigBee-ready RF Transceiver (CC2420)
  • 25
    • 84871965024 scopus 로고    scopus 로고
    • 2.4 GHz Texas Instruments Dallas, USA
    • "2.4 GHz IEEE 802.15.4 /ZigBee RF Transceiver (CC2520)," Texas Instruments, Dallas, USA. [Online]. Available: http://www.ti.com/lit/ds/symlink/cc2530.pdf
    • IEEE 802.15.4 /ZigBee RF Transceiver (CC2520)
  • 27
    • 85019856626 scopus 로고    scopus 로고
    • IEEE Tech. Rep
    • IEEE, "802.11-1997 standard," Tech. Rep. [Online]. Available: http://standards.ieee.org/getieee802/download/802. 11n-2009.pdf
    • 802.11-1997 Standard
  • 28
    • 85019834607 scopus 로고    scopus 로고
    • IEEE Tech. Rep
    • -, "802.11n-2009 standard," Tech. Rep. [Online]. Available: http://standards.ieee.org/getieee802/download/802. 11ac-2013.pdf
    • 802.11n-2009 Standard
  • 29
    • 85019923225 scopus 로고    scopus 로고
    • IEEE Tech. Rep
    • -, "802.11ac-2013 standard," Tech. Rep. [Online]. Available: https://standards.ieee.org/findstds/standard/802.11-1997. html
    • 802.11ac-2013 Standard
  • 31
    • 84908218344 scopus 로고    scopus 로고
    • ISO Tech. Rep
    • ISO, "ISO/IEC 14443," Tech. Rep. [Online]. Available: http://www.iso.org/iso/home/store/catalogue ics/catalogue detail ics.htm?csnumber=70171
    • ISO/IEC 14443
  • 32
    • 85019910270 scopus 로고    scopus 로고
    • ISO Tech. Rep
    • -, "ISO/IEC 18092," Tech. Rep. [Online]. Available: http: //www.iso.org/iso/catalogue detail.htm?csnumber=56692
    • ISO/IEC 18092
  • 33
    • 85019873707 scopus 로고    scopus 로고
    • Sony Tech. Rep
    • Sony, "Felica," Tech. Rep. [Online]. Available: http://www.sony.net/Products/felica/business/tech-support/data/M830 NFC FeliCa 1.1e.pdf
    • Felica
  • 34
    • 85019848838 scopus 로고    scopus 로고
    • ISO Tech. Rep
    • ISO, "ISO/IEC 15693," Tech. Rep. [Online]. Available: http://www.iso.org/iso/iso catalogue/catalogue ics/catalogue detail ics.htm?csnumber=39694
    • ISO/IEC 15693
  • 39
    • 85019964702 scopus 로고    scopus 로고
    • "About z-wave technology." [Online]. Available: http: //z-wavealliance.org/about z-wave technology/
    • About Z-wave Technology
  • 42
    • 84969186063 scopus 로고    scopus 로고
    • Security evaluation of the Zwavewireless protocol
    • B. Fouladi and S. Ghanoun, "Security Evaluation of the ZWaveWireless Protocol," in Black Hat Conference, 2013, p. 6.
    • (2013) Black Hat Conference , pp. 6
    • Fouladi, B.1    Ghanoun, S.2
  • 45
    • 85019901037 scopus 로고    scopus 로고
    • Specification of the bluetooth system
    • 2, Dec
    • Specification of the Bluetooth System, Bluetooth SIG Core Specification, Rev. 4.2, Dec. 2014. [Online]. Available: https://www.bluetooth.org/DocMan/handlers/DownloadDoc.ashx?doc id=286439
    • (2014) Bluetooth SIG Core Specification, Rev. , vol.4
  • 48
    • 84867006336 scopus 로고    scopus 로고
    • Overview and evaluation of Bluetooth Low Energy: An emerging low-power wireless technology
    • C. Gomez, J. Oller, and J. Paradells, "Overview and evaluation of Bluetooth Low Energy: An emerging low-power wireless technology," Sensors, vol. 12, no. 9, pp. 11 734-11 753, 2012.
    • (2012) Sensors , vol.12 , Issue.9 , pp. 11734-11753
    • Gomez, C.1    Oller, J.2    Paradells, J.3
  • 50
    • 85027019633 scopus 로고    scopus 로고
    • Thread Group, Tech. Rep.
    • "Thread Stack Fundamentals," Thread Group, Tech. Rep., 2015.
    • (2015) Thread Stack Fundamentals
  • 51
    • 85019964755 scopus 로고    scopus 로고
    • J-PAKE: Password authenticated key exchange by juggling
    • Jul work in Progress
    • F. Hao, "J-PAKE: Password Authenticated Key Exchange by Juggling," Internet Engineering Task Force, Internet-Draft draft-hao-jpake-04, Jul. 2016, work in Progress. [Online]. Available: https://tools.ietf.org/html/draft-hao-jpake-04
    • (2016) Internet Engineering Task Force, Internet-Draft draft-hao-jpake-04
    • Hao, F.1
  • 53
    • 85019956267 scopus 로고    scopus 로고
    • Thread Group, Tech. Rep.
    • "Thread Commissioning," Thread Group, Tech. Rep., 2015.
    • (2015) Thread Commissioning
  • 54
    • 38549155648 scopus 로고    scopus 로고
    • ZigBee Alliance Std. Document 053 474r17
    • ZigBee Specification, ZigBee Alliance Std. Document 053 474r17, 2008.
    • (2008) ZigBee Specification
  • 56
    • 77954318750 scopus 로고    scopus 로고
    • Recommended practices guide for securing zigbee wireless networks in process control system environments
    • K. Masica, "Recommended practices guide for securing zigbee wireless networks in process control system environments," Lawrence Livermore National Laboratory, Tech. Rep., 2007. [Online]. Available: http: //cms.doe.gov/sites/prod/files/oeprod/DocumentsandMedia/Securing ZigBee Wireless Networks.pdf
    • (2007) Lawrence Livermore National Laboratory, Tech. Rep.
    • Masica, K.1
  • 57
    • 0013091373 scopus 로고    scopus 로고
    • NIST Std. FIPS-198-1
    • The Keyed-Hash Message Authentication Code (HMAC), NIST Std. FIPS-198-1, 2008. [Online]. Available: http://csrc. nist.gov/publications/fips/fips198-1/FIPS-198-1 final.pdf
    • (2008) The Keyed-Hash Message Authentication Code (HMAC)
  • 66
    • 84911865485 scopus 로고    scopus 로고
    • Secure communication for the Internet of Things-A comparison of link-layer security and IPsec for 6LoWPAN
    • S. Raza, S. Duquennoy, J. Hoglund, U. Roedig, and T. Voigt, "Secure communication for the Internet of Things-A comparison of link-layer security and IPsec for 6LoWPAN," Security and Communication Networks, vol. 7, no. 12, pp. 2654-2668, 2014.
    • (2014) Security and Communication Networks , vol.7 , Issue.12 , pp. 2654-2668
    • Raza, S.1    Duquennoy, S.2    Hoglund, J.3    Roedig, U.4    Voigt, T.5
  • 71
    • 0003470642 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • S. Kent and K. Seo, "Security architecture for the internet protocol," Tech. Rep. [Online]. Available: https://tools.ietf.org/html/rfc4301
    • Tech. Rep
    • Kent, S.1    Seo, K.2
  • 72
    • 79955764516 scopus 로고    scopus 로고
    • Internet key exchange protocol version 2 (ikev2)
    • C. Kaufman, P. Hoffman, Y. Nir, and P. Eronen, "Internet key exchange protocol version 2 (ikev2)," Tech. Rep. [Online]. Available: https://tools.ietf.org/html/rfc5996
    • Tech. Rep
    • Kaufman, C.1    Hoffman, P.2    Nir, Y.3    Eronen, P.4
  • 74
    • 85019881935 scopus 로고    scopus 로고
    • Cryptographic algorithm implementation requirements and usage guidance for encapsulating security payload (ESP) and authentication header (AH)
    • D. McGrew and P. Hoffman, "Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)," Tech. Rep. [Online]. Available: https://tools.ietf.org/html/rfc7321
    • Tech. Rep
    • McGrew, D.1    Hoffman, P.2
  • 75
    • 84858171962 scopus 로고    scopus 로고
    • CoAP: An application protocol for billions of tiny internet nodes
    • C. Bormann, A. P. Castellani, and Z. Shelby, "CoAP: An application protocol for billions of tiny internet nodes," IEEE Internet Computing, vol. 16, no. 2, pp. 62-67, 2012.
    • (2012) IEEE Internet Computing , vol.16 , Issue.2 , pp. 62-67
    • Bormann, C.1    Castellani, A.P.2    Shelby, Z.3
  • 76
    • 84924277319 scopus 로고    scopus 로고
    • The constrained application protocol (CoAP)
    • Oct
    • C. Bormann, K. Hartke, and Z. Shelby, "The Constrained Application Protocol (CoAP)," RFC 7252, Oct. 2015. [Online]. Available: https://rfc-editor.org/rfc/rfc7252.txt
    • (2015) RFC , vol.7252
    • Bormann, C.1    Hartke, K.2    Shelby, Z.3
  • 78
    • 35248893214 scopus 로고    scopus 로고
    • Datagram transport layer security
    • Oct
    • E. Rescorla and N. Modadugu, "Datagram Transport Layer Security," RFC 4347, Oct. 2015. [Online]. Available: https://rfc-editor.org/rfc/rfc4347.txt
    • (2015) RFC , vol.4347
    • Rescorla, E.1    Modadugu, N.2
  • 79
    • 84938672829 scopus 로고    scopus 로고
    • Security for the internet of things: A survey of existing protocols and open research issues
    • J. Granjal, E. Monteiro, and J. S. Silva, "Security for the Internet of Things : A Survey of Existing Protocols and Open Research Issues," IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1294-1312, 2015.
    • (2015) IEEE Communications Surveys & Tutorials , vol.17 , Issue.3 , pp. 1294-1312
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 81
    • 84883314073 scopus 로고    scopus 로고
    • Lithe: Lightweight secure CoAP for the internet of things
    • S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight secure CoAP for the internet of things," IEEE Sensors Journal, vol. 13, no. 10, pp. 3711-3720, 2013.
    • (2013) IEEE Sensors Journal , vol.13 , Issue.10 , pp. 3711-3720
    • Raza, S.1    Shafagh, H.2    Hewage, K.3    Hummen, R.4    Voigt, T.5
  • 82
    • 84919978090 scopus 로고    scopus 로고
    • Securing the internet of things: A standardization perspective
    • S. L. Keoh, S. S. Kumar, and H. Tschofenig, "Securing the internet of things: A standardization perspective," IEEE Internet of Things Journal, vol. 1, no. 3, pp. 265-275, 2014.
    • (2014) IEEE Internet of Things Journal , vol.1 , Issue.3 , pp. 265-275
    • Keoh, S.L.1    Kumar, S.S.2    Tschofenig, H.3
  • 87
    • 80054062253 scopus 로고    scopus 로고
    • Extensible messaging and presence protocol (XMPP): Core
    • P. Saint-Andre, "Extensible Messaging and Presence Protocol (XMPP) : Core," Internet Engineering Task Force, pp. 1-212, 2011.
    • (2011) Internet Engineering Task Force , pp. 1-212
    • Saint-Andre, P.1
  • 88
    • 33751354607 scopus 로고    scopus 로고
    • Advanced message queuing protocol
    • S. Vinoski, "Advanced message queuing protocol," IEEE Internet Computing, vol. 10, no. 6, pp. 87-89, 2006.
    • (2006) IEEE Internet Computing , vol.10 , Issue.6 , pp. 87-89
    • Vinoski, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.