메뉴 건너뛰기




Volumn 4, Issue 5, 2017, Pages 1125-1142

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

Author keywords

Applications; enabling technologies; fog edge computing; internet of Things (IoT); security and privacy

Indexed keywords

APPLICATIONS; COMPUTER ARCHITECTURE; CYBER PHYSICAL SYSTEM; EMBEDDED SYSTEMS; FOG; FOG COMPUTING; HUMAN COMPUTER INTERACTION; NETWORK ARCHITECTURE; QUALITY OF SERVICE;

EID: 85026378512     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2017.2683200     Document Type: Article
Times cited : (2227)

References (166)
  • 1
    • 85037048004 scopus 로고    scopus 로고
    • Accessed on Sep. 21
    • NIST & The Smart Grid. Accessed on Sep. 21, 2016. [Online]. Available: http://www.nist.gov/smartgrid/nistandsmartgrid.cfm
    • (2016) NIST & The Smart Grid
  • 2
    • 85037038755 scopus 로고    scopus 로고
    • Open Source RFID Software Platform
    • Fosstrak: Open Source RFID Software Platform. [Online]. Available: https://fosstrak.github.io/
  • 3
    • 85037046131 scopus 로고    scopus 로고
    • Google Self-Driving Car
    • Google Self-Driving Car. [Online]. Available: http://www.google.com/ selfdrivingcar/how/
  • 5
    • 84893545247 scopus 로고    scopus 로고
    • Cyber physical system: Architecture, applications and research challenges
    • Valencia, Spain, Nov
    • S. H. Ahmed, G. Kim, and D. Kim, "Cyber physical system: Architecture, applications and research challenges," in Proc. IFIP Wireless Days (WD), Valencia, Spain, Nov. 2013, pp. 1-5.
    • (2013) Proc. IFIP Wireless Days (WD) , pp. 1-5
    • Ahmed, S.H.1    Kim, G.2    Kim, D.3
  • 7
    • 84941085241 scopus 로고    scopus 로고
    • Internet of things: A survey on enabling technologies, protocols, and applications
    • 4th Quart
    • A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications," IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347-2376, 4th Quart., 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.4 , pp. 2347-2376
    • Al-Fuqaha, A.1    Guizani, M.2    Mohammadi, M.3    Aledhari, M.4    Ayyash, M.5
  • 10
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Oct
    • L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A survey," Comput. Netw., vol. 54, no. 15, pp. 2787-2805, Oct. 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 11
    • 84866034380 scopus 로고    scopus 로고
    • The social internet of things (siot)-when social networks meet the internet of things: Concept, architecture and network characterization
    • Nov
    • L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social Internet of Things (SIoT)-When social networks meet the Internet of Things: Concept, architecture and network characterization," Comput. Netw., vol. 56, no. 16, pp. 3594-3608, Nov. 2012.
    • (2012) Comput. Netw. , vol.56 , Issue.16 , pp. 3594-3608
    • Atzori, L.1    Iera, A.2    Morabito, G.3    Nitti, M.4
  • 13
    • 34047126869 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
    • May
    • P. Baronti et al., "Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards," Comput. Commun., vol. 30, no. 7, pp. 1655-1695, May 2007.
    • (2007) Comput. Commun. , vol.30 , Issue.7 , pp. 1655-1695
    • Baronti, P.1
  • 14
    • 84865367037 scopus 로고    scopus 로고
    • Forrester Res., Cambridge, MA, USA, Tech. Rep., Nov
    • J. Bélissent, "Getting clever about smart cities: New opportunities require new business models," Forrester Res., Cambridge, MA, USA, Tech. Rep., Nov. 2010. [Online]. Available: https://www.forrester.com/ report/Getting+Clever+About+Smart+Cities+New+Opportunities+ Require+New+Business+Models/-/E-RES56701?aid=AST127312
    • (2010) Getting Clever about Smart Cities: New Opportunities Require New Business Models
    • Bélissent, J.1
  • 17
    • 84858171962 scopus 로고    scopus 로고
    • CoAP: An application protocol for billions of tiny Internet nodes
    • Mar./Apr
    • C. Bormann, A. P. Castellani, and Z. Shelby, "CoAP: An application protocol for billions of tiny Internet nodes," IEEE Internet Comput., vol. 16, no. 2, pp. 62-67, Mar./Apr. 2012.
    • (2012) IEEE Internet Comput. , vol.16 , Issue.2 , pp. 62-67
    • Bormann, C.1    Castellani, A.P.2    Shelby, Z.3
  • 19
    • 85010882210 scopus 로고    scopus 로고
    • The deployment of a smart monitoring system using wireless sensor and actuator networks
    • Gaithersburg, MD, USA, Oct
    • N. Bressan et al., "The deployment of a smart monitoring system using wireless sensor and actuator networks," in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Gaithersburg, MD, USA, Oct. 2010, pp. 49-54.
    • (2010) Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm) , pp. 49-54
    • Bressan, N.1
  • 20
    • 85049030563 scopus 로고    scopus 로고
    • Collective data-sanitization for preventing sensitive information inference attacks in social networks
    • to be published
    • Z. Cai, Z. He, X. Guan, and Y. Li, "Collective data-sanitization for preventing sensitive information inference attacks in social networks," IEEE Trans. Depend. Secure Comput., to be published, doi: 10.1109/TDSC.2016.2613521.
    • IEEE Trans. Depend. Secure Comput
    • Cai, Z.1    He, Z.2    Guan, X.3    Li, Y.4
  • 21
    • 84877659567 scopus 로고    scopus 로고
    • Pro-energy: A novel energy prediction model for solar and wind energy-harvesting wireless sensor networks
    • Las Vegas, NV, USA, Oct
    • A. Cammarano, C. Petrioli, and D. Spenza, "Pro-energy: A novel energy prediction model for solar and wind energy-harvesting wireless sensor networks," in Proc. IEEE 9th Int. Conf. Mobile Ad-Hoc Sensor Syst. (MASS), Las Vegas, NV, USA, Oct. 2012, pp. 75-83.
    • (2012) Proc. IEEE 9th Int. Conf. Mobile Ad-Hoc Sensor Syst. (MASS) , pp. 75-83
    • Cammarano, A.1    Petrioli, C.2    Spenza, D.3
  • 22
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized publickey management for mobile ad hoc networks
    • Jan./Mar
    • S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-organized publickey management for mobile ad hoc networks," IEEE Trans. Mobile Comput., vol. 2, no. 1, pp. 52-64, Jan./Mar. 2003.
    • (2003) IEEE Trans. Mobile Comput. , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 24
    • 67649600839 scopus 로고    scopus 로고
    • The 'wireless sensor networks for city-wide ambient intelligence (WISE-WAI)' project
    • May
    • P. Casari et al., "The 'wireless sensor networks for city-wide ambient intelligence (WISE-WAI)' project," Sensors, vol. 9, no. 6, pp. 4056-4082, May 2009.
    • (2009) Sensors , vol.9 , Issue.6 , pp. 4056-4082
    • Casari, P.1
  • 25
    • 84866914974 scopus 로고    scopus 로고
    • Challenges in middleware solutions for the Internet of Things
    • Denver, CO, USA, May
    • M. A. Chaqfeh and N. Mohamed, "Challenges in middleware solutions for the Internet of Things," in Proc. Int. Conf. Collaboration Technol. Syst. (CTS), Denver, CO, USA, May 2012, pp. 21-26.
    • (2012) Proc. Int. Conf. Collaboration Technol. Syst. (CTS) , pp. 21-26
    • Chaqfeh, M.A.1    Mohamed, N.2
  • 26
  • 27
    • 85058010955 scopus 로고    scopus 로고
    • User differentiated verifiable file search on the cloud
    • to be published
    • F. Chen, T. Xiang, X. Fu, and W. Yu, "User differentiated verifiable file search on the cloud," IEEE Trans. Services Comput., to be published, doi: 10.1109/TSC.2016.2589245.
    • IEEE Trans. Services Comput
    • Chen, F.1    Xiang, T.2    Fu, X.3    Yu, W.4
  • 28
    • 84912093152 scopus 로고    scopus 로고
    • Trust management for service composition in SOA-based IoT systems
    • Istanbul, Turkey, Apr
    • I.-R. Chen, J. Guo, and F. Bao, "Trust management for service composition in SOA-based IoT systems," in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Istanbul, Turkey, Apr. 2014, pp. 3444-3449.
    • (2014) Proc. IEEE Wireless Commun. Netw. Conf. (WCNC) , pp. 3444-3449
    • Chen, I.-R.1    Guo, J.2    Bao, F.3
  • 29
    • 84949671050 scopus 로고    scopus 로고
    • A cloud computing based network monitoring and threat detection system for critical infrastructures
    • Apr
    • Z. Chen et al., "A cloud computing based network monitoring and threat detection system for critical infrastructures," Big Data Res., vol. 3, pp. 10-23, Apr. 2016.
    • (2016) Big Data Res. , vol.3 , pp. 10-23
    • Chen, Z.1
  • 32
    • 84907599949 scopus 로고    scopus 로고
    • TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks
    • Sep
    • M.-C. Chuang and J.-F. Lee, "TEAM: Trust-extended authentication mechanism for vehicular ad hoc networks," IEEE Syst. J., vol. 8, no. 3, pp. 749-758, Sep. 2014.
    • (2014) IEEE Syst. J. , vol.8 , Issue.3 , pp. 749-758
    • Chuang, M.-C.1    Lee, J.-F.2
  • 33
    • 84893235690 scopus 로고    scopus 로고
    • Compose: Building smart & contextaware mobile applications utilizing IoT technologies
    • Trento, Italy, Oct
    • C. Doukas and F. Antonelli, "COMPOSE: Building smart & contextaware mobile applications utilizing IoT technologies," in Proc. 5th IEEE Glob. Inf. Infrastruct. Netw. Symp., Trento, Italy, Oct. 2013, pp. 1-6.
    • (2013) Proc. 5th IEEE Glob. Inf. Infrastruct. Netw. Symp. , pp. 1-6
    • Doukas, C.1    Antonelli, F.2
  • 34
    • 33750023217 scopus 로고    scopus 로고
    • An effective key management scheme for heterogeneous sensor networks
    • X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, "An effective key management scheme for heterogeneous sensor networks," Ad Hoc Netw., vol. 5, no. 1, pp. 24-34, 2007.
    • (2007) Ad Hoc Netw. , vol.5 , Issue.1 , pp. 24-34
    • Du, X.1    Xiao, Y.2    Guizani, M.3    Chen, H.-H.4
  • 36
    • 84856448398 scopus 로고    scopus 로고
    • Combining heterogeneous service technologies for building an Internet of Things middleware
    • Feb
    • K. Gama, L. Touseau, and D. Donsez, "Combining heterogeneous service technologies for building an Internet of Things middleware," Comput. Commun., vol. 35, no. 4, pp. 405-417, Feb. 2012.
    • (2012) Comput. Commun. , vol.35 , Issue.4 , pp. 405-417
    • Gama, K.1    Touseau, L.2    Donsez, D.3
  • 38
    • 85006725798 scopus 로고    scopus 로고
    • Assessing performance of constrained application protocol (CoAP) in MANET using emulation
    • Odense, Denmark
    • W. Gao, J. Nguyen, W. Yu, C. Lu, and D. Ku, "Assessing performance of constrained application protocol (CoAP) in MANET using emulation," in Proc. ACM Int. Conf. Rel. Convergent Syst. (RACS), Odense, Denmark, 2016, pp. 103-108.
    • (2016) Proc. ACM Int. Conf. Rel. Convergent Syst. (RACS) , pp. 103-108
    • Gao, W.1    Nguyen, J.2    Yu, W.3    Lu, C.4    Ku, D.5
  • 39
    • 24144459865 scopus 로고    scopus 로고
    • CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
    • Seoul, South Korea, May
    • J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks," in Proc. IEEE Int. Conf. Commun. (ICC), vol. 5. Seoul, South Korea, May 2005, pp. 3044-3049.
    • (2005) Proc. IEEE Int. Conf. Commun. (ICC) , vol.5 , pp. 3044-3049
    • Girao, J.1    Westhoff, D.2    Schneider, M.3
  • 41
    • 77953085540 scopus 로고    scopus 로고
    • Wireless home automation networks: A survey of architectures and technologies
    • Jun
    • C. Gomez and J. Paradells, "Wireless home automation networks: A survey of architectures and technologies," IEEE Commun. Mag., vol. 48, no. 6, pp. 92-101, Jun. 2010.
    • (2010) IEEE Commun. Mag. , vol.48 , Issue.6 , pp. 92-101
    • Gomez, C.1    Paradells, J.2
  • 42
    • 84959202946 scopus 로고    scopus 로고
    • On the equivalence between interference and eavesdropping in wireless communications
    • Dec
    • G. Gomez, F. J. Lopez-Martinez, D. Morales-Jimenez, and M. R. McKay, "On the equivalence between interference and eavesdropping in wireless communications," IEEE Trans. Veh. Technol., vol. 64, no. 12, pp. 5935-5940, Dec. 2015.
    • (2015) IEEE Trans. Veh. Technol. , vol.64 , Issue.12 , pp. 5935-5940
    • Gomez, G.1    Lopez-Martinez, F.J.2    Morales-Jimenez, D.3    McKay, M.R.4
  • 43
    • 78649872682 scopus 로고    scopus 로고
    • A triple space-based semantic distributed middleware for Internet of Things
    • Vienna, Austria, Jul
    • A. Gómez-Goiri and D. López-de Ipin&tild;a, "A triple space-based semantic distributed middleware for Internet of Things," in Proc. Int. Conf. Web Eng., Vienna, Austria, Jul. 2010, pp. 447-458.
    • (2010) Proc. Int. Conf. Web Eng. , pp. 447-458
    • Gómez-Goiri, A.1    De López, I.D.2
  • 45
    • 77956394831 scopus 로고    scopus 로고
    • Interacting with the SOA-based Internet of Things: Discovery, query, selection, and on-demand provisioning of Web services
    • Jul./Sep
    • D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, and D. Savio, "Interacting with the SOA-based Internet of Things: Discovery, query, selection, and on-demand provisioning of Web services," IEEE Trans. Services Comput., vol. 3, no. 3, pp. 223-235, Jul./Sep. 2010.
    • (2010) IEEE Trans. Services Comput. , vol.3 , Issue.3 , pp. 223-235
    • Guinard, D.1    Trifa, V.2    Karnouskos, S.3    Spiess, P.4    Savio, D.5
  • 46
    • 33646518088 scopus 로고    scopus 로고
    • Middleware: Middleware challenges and approaches for wireless sensor networks
    • Mar
    • S. Hadim and N. Mohamed, "Middleware: Middleware challenges and approaches for wireless sensor networks," IEEE Distrib. Syst. Online, vol. 7, no. 3, p. 1, Mar. 2006.
    • (2006) IEEE Distrib. Syst. Online , vol.7 , Issue.3 , pp. 1
    • Hadim, S.1    Mohamed, N.2
  • 47
    • 84875214013 scopus 로고    scopus 로고
    • A cross-layer communication module for the Internet of Things
    • Feb
    • C. Han, J. M. Jornet, E. Fadel, and I. F. Akyildiz, "A cross-layer communication module for the Internet of Things," Comput. Netw., vol. 57, no. 3, pp. 622-633, Feb. 2013.
    • (2013) Comput. Netw. , vol.57 , Issue.3 , pp. 622-633
    • Han, C.1    Jornet, J.M.2    Fadel, E.3    Akyildiz, I.F.4
  • 49
    • 84880747406 scopus 로고    scopus 로고
    • The two-dimensional bar code application in book management
    • Sanya, China, Oct
    • X. He, "The two-dimensional bar code application in book management," in Proc. Int. Conf. Web Inf. Syst. Min. (WISM), vol. 1. Sanya, China, Oct. 2010, pp. 409-411.
    • (2010) Proc. Int. Conf. Web Inf. Syst. Min. (WISM) , vol.1 , pp. 409-411
    • He, X.1
  • 51
    • 84865089693 scopus 로고    scopus 로고
    • Active wireless sensor with radio frequency identification chip
    • Opatija, Croatia, May
    • D. C ika, M. Draganic, and Z. Šipuš, "Active wireless sensor with radio frequency identification chip," in Proc. 35th Int. Conv., Opatija, Croatia, May 2012, pp. 727-732.
    • (2012) Proc. 35th Int. Conv , pp. 727-732
    • Ika, D.C.1    Draganic, M.2    Šipuš, Z.3
  • 52
    • 79952489796 scopus 로고    scopus 로고
    • Survey paper: A survey of applications and requirements of unique identification systems and RFID techniques
    • Apr
    • E. Ilie-Zudor, Z. Kemény, F. van Blommestein, L. Monostori, and A. van der Meulen, "Survey paper: A survey of applications and requirements of unique identification systems and RFID techniques," Comput. Ind. Eng., vol. 62, no. 3, pp. 227-252, Apr. 2011.
    • (2011) Comput. Ind. Eng. , vol.62 , Issue.3 , pp. 227-252
    • Ilie-Zudor, E.1    Kemény, Z.2    Van Blommestein, F.3    Monostori, L.4    Van Blommestein, A.5
  • 56
    • 70350713978 scopus 로고    scopus 로고
    • RFID access authorization by face recognition
    • Jul
    • B.-Z. Jing et al., "RFID access authorization by face recognition," in Proc. Int. Conf. Mach. Learn. Cybern., vol. 1. Jul. 2009, pp. 302-307.
    • (2009) Proc. Int. Conf. Mach. Learn. Cybern. , vol.1 , pp. 302-307
    • Jing, B.-Z.1
  • 57
    • 84992035688 scopus 로고    scopus 로고
    • QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks
    • Mar
    • G. Kalnoor and J. Agarkhed, "QoS based multipath routing for intrusion detection of sinkhole attack in wireless sensor networks," in Proc. Int. Conf. Circuit Power Comput. Technol. (ICCPCT), Mar. 2016, pp. 1-6.
    • (2016) Proc. Int. Conf. Circuit Power Comput. Technol. (ICCPCT) , pp. 1-6
    • Kalnoor, G.1    Agarkhed, J.2
  • 59
    • 56349124194 scopus 로고    scopus 로고
    • When HART goes wireless: Understanding and implementing the wirelessHART standard
    • Hamburg, Germany, Sep
    • A. N. Kim, F. Hekland, S. Petersen, and P. Doyle, "When HART goes wireless: Understanding and implementing the wirelessHART standard," in Proc. IEEE Int. Conf. Emerg. Technol. Factory Autom., Hamburg, Germany, Sep. 2008, pp. 899-907.
    • (2008) Proc. IEEE Int. Conf. Emerg. Technol. Factory Autom. , pp. 899-907
    • Kim, A.N.1    Hekland, F.2    Petersen, S.3    Doyle, P.4
  • 60
    • 38949170182 scopus 로고    scopus 로고
    • Access control and authorization for security of RFID multi-domain using SAML and XACML
    • Nov
    • D. S. Kim, T.-H. Shin, and J. S. Park, "Access control and authorization for security of RFID multi-domain using SAML and XACML," in Proc. Int. Conf. Comput. Intell. Security, vol. 2. Nov. 2006, pp. 1587-1590.
    • (2006) Proc. Int. Conf. Comput. Intell. Security , vol.2 , pp. 1587-1590
    • Kim, D.S.1    Shin, T.-H.2    Park, J.S.3
  • 61
    • 84959330414 scopus 로고    scopus 로고
    • Prefetching-based data dissemination in vehicular cloud systems
    • Jan
    • R. Kim, H. Lim, and B. Krishnamachari, "Prefetching-based data dissemination in vehicular cloud systems," IEEE Trans. Veh. Technol., vol. 65, no. 1, pp. 292-306, Jan. 2015.
    • (2015) IEEE Trans. Veh. Technol. , vol.65 , Issue.1 , pp. 292-306
    • Kim, R.1    Lim, H.2    Krishnamachari, B.3
  • 63
    • 33845622376 scopus 로고    scopus 로고
    • A fully integrated 2.4-GHz IEEE 802.15.4-compliant transceiver for ZigBeeTM trade applications
    • Dec
    • W. Kluge et al., "A fully integrated 2.4-GHz IEEE 802.15.4-compliant transceiver for ZigBeeTM trade applications," IEEE J. Solid-State Circuits, vol. 41, no. 12, pp. 2767-2775, Dec. 2006.
    • (2006) IEEE J. Solid-State Circuits , vol.41 , Issue.12 , pp. 2767-2775
    • Kluge, W.1
  • 64
    • 33749346563 scopus 로고    scopus 로고
    • Upper Saddle River, NJ, USA: IBM Press
    • S. Lahiri, RFID Sourcebook. Upper Saddle River, NJ, USA: IBM Press, 2005.
    • (2005) RFID Sourcebook
    • Lahiri, S.1
  • 65
    • 77956382087 scopus 로고    scopus 로고
    • A survey of mobile phone sensing
    • Sep
    • N. D. Lane et al., "A survey of mobile phone sensing," IEEE Commun. Mag., vol. 48, no. 9, pp. 140-150, Sep. 2010.
    • (2010) IEEE Commun. Mag. , vol.48 , Issue.9 , pp. 140-150
    • Lane, N.D.1
  • 66
    • 34250363162 scopus 로고    scopus 로고
    • A dynamic geographic hash table for data-centric storage in sensor networks
    • Las Vegas, NV, USA
    • T. N. Le, W. Yu, X. Bai, and D. Xuan, "A dynamic geographic hash table for data-centric storage in sensor networks," in Proc. IEEE Int. Conf. Comput. Netw. Commun. (WCNC), Las Vegas, NV, USA, 2007, pp. 2168-2174.
    • (2007) Proc. IEEE Int. Conf. Comput. Netw. Commun. (WCNC) , pp. 2168-2174
    • Le, T.N.1    Yu, W.2    Bai, X.3    Xuan, D.4
  • 67
    • 84914162268 scopus 로고    scopus 로고
    • A passivity framework for modeling and mitigating wormhole attacks on networked control systems
    • Dec
    • P. Lee, A. Clark, L. Bushnell, and R. Poovendran, "A passivity framework for modeling and mitigating wormhole attacks on networked control systems," IEEE Trans. Autom. Control, vol. 59, no. 12, pp. 3224-3237, Dec. 2014.
    • (2014) IEEE Trans. Autom. Control , vol.59 , Issue.12 , pp. 3224-3237
    • Lee, P.1    Clark, A.2    Bushnell, L.3    Poovendran, R.4
  • 68
    • 84921509489 scopus 로고    scopus 로고
    • A federated architecture approach for Internet of Things security
    • Naples, Italy, Nov
    • M. Leo, F. Battisti, M. Carli, and A. Neri, "A federated architecture approach for Internet of Things security," in Proc. Euro Med Telco Conf. (EMTC), Naples, Italy, Nov. 2014, pp. 1-5.
    • (2014) Proc. Euro Med Telco Conf. (EMTC) , pp. 1-5
    • Leo, M.1    Battisti, F.2    Carli, M.3    Neri, A.4
  • 69
    • 84863148738 scopus 로고    scopus 로고
    • Towards effective en-route filtering against injected false data in wireless sensor networks
    • Houston, TX, USA, Dec
    • J. Lin, X. Yang, W. Yu, and X. Fu, "Towards effective en-route filtering against injected false data in wireless sensor networks," in Proc. IEEE Glob. Telecommun. Conf. (GLOBECOM), Houston, TX, USA, Dec. 2011, pp. 1-5.
    • (2011) Proc. IEEE Glob. Telecommun. Conf. (GLOBECOM) , pp. 1-5
    • Lin, J.1    Yang, X.2    Yu, W.3    Fu, X.4
  • 71
    • 84961720902 scopus 로고    scopus 로고
    • Towards multistep electricity prices in smart grid electricity markets
    • Jan
    • J. Lin, W. Yu, and X. Yang, "Towards multistep electricity prices in smart grid electricity markets," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 286-302, Jan. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.1 , pp. 286-302
    • Lin, J.1    Yu, W.2    Yang, X.3
  • 72
    • 84861506150 scopus 로고    scopus 로고
    • On false data injection attacks against distributed energy routing in smart grid
    • Beijing, China, Apr
    • J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao, "On false data injection attacks against distributed energy routing in smart grid," in Proc. IEEE/ACM 3rd Int. Conf. Cyber-Phys. Syst. (ICCPS), Beijing, China, Apr. 2012, pp. 183-192.
    • (2012) Proc. IEEE/ACM 3rd Int. Conf. Cyber-Phys. Syst. (ICCPS) , pp. 183-192
    • Lin, J.1    Yu, W.2    Yang, X.3    Xu, G.4    Zhao, W.5
  • 73
    • 84944318781 scopus 로고    scopus 로고
    • A novel dynamic en-route decision real-time route guidance scheme in intelligent transportation systems
    • Columbus, OH, USA, Jun
    • J. Lin et al., "A novel dynamic en-route decision real-time route guidance scheme in intelligent transportation systems," in Proc. IEEE 35th Int. Conf. Distrib. Comput. Syst. (ICDCS), Columbus, OH, USA, Jun. 2015, pp. 61-72.
    • (2015) Proc. IEEE 35th Int. Conf. Distrib. Comput. Syst. (ICDCS) , pp. 61-72
    • Lin, J.1
  • 75
    • 74049162773 scopus 로고    scopus 로고
    • A new cell counter based attack against tor
    • Chicago, IL, USA
    • Z. Ling et al., "A new cell counter based attack against tor," in Proc. 16th ACM Conf. Comput. Commun. Security (CCS), Chicago, IL, USA, 2009, pp. 578-589.
    • (2009) Proc. 16th ACM Conf. Comput. Commun. Security (CCS) , pp. 578-589
    • Ling, Z.1
  • 76
    • 84865344045 scopus 로고    scopus 로고
    • A new cell-counting-based attack against tor
    • Aug
    • Z. Ling et al., "A new cell-counting-based attack against tor," IEEE/ACM Trans. Netw., vol. 20, no. 4, pp. 1245-1261, Aug. 2012.
    • (2012) IEEE/ACM Trans. Netw. , vol.20 , Issue.4 , pp. 1245-1261
    • Ling, Z.1
  • 77
    • 85010710434 scopus 로고    scopus 로고
    • Cooperative spectrum sharing of multiple primary users and multiple secondary users
    • H. Liu, S. Hua, X. Zhuo, D. Chen, and X. Cheng, "Cooperative spectrum sharing of multiple primary users and multiple secondary users," Digit. Commun. Netw., vol. 2, no. 4, pp. 191-195, 2016.
    • (2016) Digit. Commun. Netw. , vol.2 , Issue.4 , pp. 191-195
    • Liu, H.1    Hua, S.2    Zhuo, X.3    Chen, D.4    Cheng, X.5
  • 85
    • 0036096757 scopus 로고    scopus 로고
    • Review of the use of biosensors as analytical tools in the food and drink industries
    • L. D. Mello and L. T. Kubota, "Review of the use of biosensors as analytical tools in the food and drink industries," Food Chem., vol. 77, no. 2, pp. 237-256, 2002.
    • (2002) Food Chem. , vol.77 , Issue.2 , pp. 237-256
    • Mello, L.D.1    Kubota, L.T.2
  • 87
    • 84959453045 scopus 로고    scopus 로고
    • A review on internet of things (iot), internet of everything (ioe) and internet of nano things (iont)
    • Wrexham, U.K., Sep
    • M. H. Miraz, M. Ali, P. S. Excell, and R. Picking, "A review on Internet of Things (IoT), Internet of everything (IoE) and Internet of Nano Things (IoNT)," in Proc. Internet Technol. Appl. (ITA), Wrexham, U.K., Sep. 2015, pp. 219-224.
    • (2015) Proc. Internet Technol. Appl. (ITA) , pp. 219-224
    • Miraz, M.H.1    Ali, M.2    Excell, P.S.3    Picking, R.4
  • 88
    • 78650174439 scopus 로고    scopus 로고
    • Classifying RFID attacks and defenses
    • Nov
    • A. Mitrokotsa, M. R. Rieback, and A. S. Tanenbaum, "Classifying RFID attacks and defenses," Inf. Syst. Front., vol. 12, no. 5, pp. 491-505, Nov. 2010.
    • (2010) Inf. Syst. Front. , vol.12 , Issue.5 , pp. 491-505
    • Mitrokotsa, A.1    Rieback, M.R.2    Tanenbaum, A.S.3
  • 90
    • 34548357050 scopus 로고    scopus 로고
    • A new simple adaptive noise cancellation scheme based on ALE and NLMS filter
    • Fredericton, NB, Canada, May
    • J. R. Mohammed, "A new simple adaptive noise cancellation scheme based on ALE and NLMS filter," in Proc. 5th Annu. Conf. Commun. Netw. Services Res. (CNSR), Fredericton, NB, Canada, May 2007, pp. 245-254.
    • (2007) Proc. 5th Annu. Conf. Commun. Netw. Services Res. (CNSR) , pp. 245-254
    • Mohammed, J.R.1
  • 93
    • 84925411568 scopus 로고    scopus 로고
    • A robust software barcode reader using the Hough transform
    • Bethesda, MD, USA, Oct
    • R. Muniz, L. Junco, and A. Otero, "A robust software barcode reader using the Hough transform," in Proc. Int. Conf. Inf. Intell. Syst., Bethesda, MD, USA, Oct. 1999, pp. 313-319.
    • (1999) Proc. Int. Conf. Inf. Intell. Syst. , pp. 313-319
    • Muniz, R.1    Junco, L.2    Otero, A.3
  • 97
    • 84883206819 scopus 로고    scopus 로고
    • On optimal scheduling in duty-cycled industrial IoT applications using IEEE802.15.4e TSCH
    • Oct
    • M. R. Palattella et al., "On optimal scheduling in duty-cycled industrial IoT applications using IEEE802.15.4e TSCH," IEEE Sensors J., vol. 13, no. 10, pp. 3655-3666, Oct. 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.10 , pp. 3655-3666
    • Palattella, M.R.1
  • 98
    • 84881312915 scopus 로고    scopus 로고
    • Standardized protocol stack for the Internet of (important) Things
    • 3rd Quart
    • M. R. Palattella et al., "Standardized protocol stack for the Internet of (important) Things," IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 1389-1406, 3rd Quart., 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.3 , pp. 1389-1406
    • Palattella, M.R.1
  • 101
    • 84863331774 scopus 로고    scopus 로고
    • A context-aware scheme for privacy-preserving location-based services
    • A. Pingley, W. Yu, N. Zhang, X. Fu, and W. Zhao, "A context-aware scheme for privacy-preserving location-based services," Comput. Netw., vol. 56, no. 11, pp. 2551-2568, 2012.
    • (2012) Comput. Netw. , vol.56 , Issue.11 , pp. 2551-2568
    • Pingley, A.1    Yu, W.2    Zhang, N.3    Fu, X.4    Zhao, W.5
  • 102
    • 77749336823 scopus 로고    scopus 로고
    • A survey and taxonomy of infrastructure as a service andWeb hosting cloud providers
    • Banff, AB, Canada, Oct
    • R. Prodan and S. Ostermann, "A survey and taxonomy of infrastructure as a service andWeb hosting cloud providers," in Proc. 10th IEEE/ACM Int. Conf. Grid Comput., Banff, AB, Canada, Oct. 2009, pp. 17-25.
    • (2009) Proc. 10th IEEE/ACM Int. Conf. Grid Comput. , pp. 17-25
    • Prodan, R.1    Ostermann, S.2
  • 103
    • 84962258940 scopus 로고    scopus 로고
    • Low latency geo-distributed data analytic
    • London, U.K., Aug
    • Q. Pu et al., "Low latency geo-distributed data analytic," in Proc. ACM SIGCOMM, London, U.K., Aug. 2015, pp. 421-434.
    • (2015) Proc. ACM SIGCOMM , pp. 421-434
    • Pu, Q.1
  • 105
    • 84929154400 scopus 로고    scopus 로고
    • Privacy and quality preserving multimedia data aggregation for participatory sensing systems
    • Jun
    • F. Qiu, F. Wu, and G. Chen, "Privacy and quality preserving multimedia data aggregation for participatory sensing systems," IEEE Trans. Mobile Comput., vol. 14, no. 6, pp. 1287-1300, Jun. 2015.
    • (2015) IEEE Trans. Mobile Comput. , vol.14 , Issue.6 , pp. 1287-1300
    • Qiu, F.1    Wu, F.2    Chen, G.3
  • 106
    • 84891401751 scopus 로고    scopus 로고
    • On scaling perturbation based privacy-preserving schemes in smart metering systems
    • Nassau, The Bahamas, Jul
    • X. Ren, X. Yang, J. Lin, Q. Yang, and W. Yu, "On scaling perturbation based privacy-preserving schemes in smart metering systems," in Proc. 22nd Int. Conf. Comput. Commun. Netw. (ICCCN), Nassau, The Bahamas, Jul. 2013, pp. 1-7.
    • (2013) Proc. 22nd Int. Conf. Comput. Commun. Netw. (ICCCN) , pp. 1-7
    • Ren, X.1    Yang, X.2    Lin, J.3    Yang, Q.4    Yu, W.5
  • 108
    • 84942808761 scopus 로고    scopus 로고
    • Review of the present technologies concurrently contributing to the implementation of the Internet of things (IoT) paradigm: RFID, green electronics, WPT and energy harvesting
    • San Diego, CA, USA, Jan
    • L. Roselli et al., "Review of the present technologies concurrently contributing to the implementation of the Internet of things (IoT) paradigm: RFID, green electronics, WPT and energy harvesting," in Proc. IEEE Topical Conf. Wireless Sensors Sensor Netw. (WiSNet), San Diego, CA, USA, Jan. 2015, pp. 1-3.
    • (2015) Proc. IEEE Topical Conf. Wireless Sensors Sensor Netw. (WiSNet) , pp. 1-3
    • Roselli, L.1
  • 111
    • 16644402412 scopus 로고    scopus 로고
    • Extensible messaging and presence protocol (XMPP): Core
    • Fremont, CA, USA, RFC 6121, Mar
    • P. Saint-Andre, "Extensible messaging and presence protocol (XMPP): Core," Internet Eng. Task Force, Fremont, CA, USA, RFC 6121, Mar. 2011.
    • (2011) Internet Eng. Task Force
    • Saint-Andre, P.1
  • 116
    • 84987842183 scopus 로고    scopus 로고
    • Edge computing: Vision and challenges
    • Oct
    • W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge computing: Vision and challenges," IEEE Internet Things J., vol. 3, no. 5, pp. 637-646, Oct. 2016.
    • (2016) IEEE Internet Things J. , vol.3 , Issue.5 , pp. 637-646
    • Shi, W.1    Cao, J.2    Zhang, Q.3    Li, Y.4    Xu, L.5
  • 117
    • 84911364620 scopus 로고    scopus 로고
    • Detecting sinkhole attack in wireless sensor network
    • Feb
    • V. Soni, P. Modi, and V. Chaudhri, "Detecting sinkhole attack in wireless sensor network," Int. J. Appl. Innov. Eng. Manag., vol. 2, no. 2, pp. 29-32, Feb. 2013.
    • (2013) Int. J. Appl. Innov. Eng. Manag. , vol.2 , Issue.2 , pp. 29-32
    • Soni, V.1    Modi, P.2    Chaudhri, V.3
  • 118
    • 70449486885 scopus 로고    scopus 로고
    • Soa-based integration of the Internet of Things in enterprise services
    • Los Angeles, CA, USA, Jul
    • P. Spiess et al., "Soa-based integration of the Internet of Things in enterprise services," in Proc. IEEE Int. Conf. Web Services (ICWS), Los Angeles, CA, USA, Jul. 2009, pp. 968-975.
    • (2009) Proc. IEEE Int. Conf. Web Services (ICWS) , pp. 968-975
    • Spiess, P.1
  • 119
    • 84906842496 scopus 로고    scopus 로고
    • Research directions for the Internet of Things
    • Feb
    • J. A. Stankovic, "Research directions for the Internet of Things," IEEE Internet Things J., vol. 1, no. 1, pp. 3-9, Feb. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.1 , pp. 3-9
    • Stankovic, J.A.1
  • 121
    • 84885965762 scopus 로고    scopus 로고
    • Survey on security threats and protection mechanisms in embedded automotive networks
    • Budapest, Hungary, Jun
    • I. Studnia et al., "Survey on security threats and protection mechanisms in embedded automotive networks," in Proc. 43rd Annu. IEEE/IFIP Conf. Depend. Syst. Netw. Workshop (DSN W), Budapest, Hungary, Jun. 2013, pp. 1-12.
    • (2013) Proc. 43rd Annu. IEEE/IFIP Conf. Depend. Syst. Netw. Workshop (DSN W) , pp. 1-12
    • Studnia, I.1
  • 124
    • 78149306616 scopus 로고    scopus 로고
    • Future internet: The internet of things
    • Chengdu, China, Aug
    • L. Tan and N. Wang, "Future Internet: The Internet of Things," in Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), vol. 5. Chengdu, China, Aug. 2010, pp. V5-376-V5-380.
    • (2010) Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE) , vol.5 , pp. V5376-V5380
    • Tan, L.1    Wang, N.2
  • 125
    • 84894683129 scopus 로고    scopus 로고
    • Data mining for internet of things: A survey
    • 1st Quart
    • C.-W. Tsai, C.-F. Lai, M.-C. Chiang, and L. T. Yang, "Data mining for Internet of Things: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 77-97, 1st Quart., 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.1 , pp. 77-97
    • Tsai, C.-W.1    Lai, C.-F.2    Chiang, M.-C.3    Yang, L.T.4
  • 126
    • 84995347311 scopus 로고    scopus 로고
    • Joint optimization of spectrum and energy efficiency in cognitive radio networks
    • S. Wang and C. Wang, "Joint optimization of spectrum and energy efficiency in cognitive radio networks," Digit. Commun. Netw., vol. 1, no. 3, pp. 161-170, 2015.
    • (2015) Digit. Commun. Netw. , vol.1 , Issue.3 , pp. 161-170
    • Wang, S.1    Wang, C.2
  • 128
    • 84871266331 scopus 로고    scopus 로고
    • RPL: Ipv6 routing protocol for low-power and lossy networks
    • Fremont, CA, USA, RFC 6550, Mar
    • T. Winter et al., "RPL: Ipv6 routing protocol for low-power and lossy networks," Internet Eng. Task Force, Fremont, CA, USA, RFC 6550, Mar. 2012.
    • (2012) Internet Eng. Task Force
    • Winter, T.1
  • 129
    • 85018836720 scopus 로고    scopus 로고
    • Scalable privacy-preserving big data aggregation mechanism
    • D. Wu, B. Yang, and R. Wang, "Scalable privacy-preserving big data aggregation mechanism," Digit. Commun. Netw., vol. 2, no. 3, pp. 122-129, 2016.
    • (2016) Digit. Commun. Netw. , vol.2 , Issue.3 , pp. 122-129
    • Wu, D.1    Yang, B.2    Wang, R.3
  • 130
    • 79960924365 scopus 로고    scopus 로고
    • Review: From wireless sensor networks towards cyber physical systems
    • Aug
    • F.-J. Wu, Y.-F. Kao, and Y.-C. Tseng, "Review: From wireless sensor networks towards cyber physical systems," Pervasive Mobile Comput., vol. 7, no. 4, pp. 397-413, Aug. 2011.
    • (2011) Pervasive Mobile Comput. , vol.7 , Issue.4 , pp. 397-413
    • Wu, F.-J.1    Kao, Y.-F.2    Tseng, Y.-C.3
  • 131
    • 85030651432 scopus 로고    scopus 로고
    • Design and realization of WInternet: From Net of Things to Internet of Things
    • Feb
    • J. Wu and W. Zhao, "Design and realization of WInternet: From Net of Things to Internet of Things," ACM Trans. Cyber Phys. Syst., vol. 1, no. 1, Feb. 2017, Art. no. 2.
    • (2017) ACM Trans. Cyber Phys. Syst. , vol.1 , Issue.1
    • Wu, J.1    Zhao, W.2
  • 133
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Y. Xiao et al., "A survey of key management schemes in wireless sensor networks," J. Comput. Commun., vol. 30, nos. 11-12, pp. 2314-2341, 2007.
    • (2007) J. Comput. Commun. , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1
  • 134
    • 84923317932 scopus 로고    scopus 로고
    • Information security in big data: Privacy and data mining
    • Oct
    • L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, "Information security in big data: Privacy and data mining," IEEE Access, vol. 2, pp. 1149-1176, Oct. 2014.
    • (2014) IEEE Access , vol.2 , pp. 1149-1176
    • Xu, L.1    Jiang, C.2    Wang, J.3    Yuan, J.4    Ren, Y.5
  • 135
    • 81255151151 scopus 로고    scopus 로고
    • Enterprise systems: State of the art and future trends
    • Nov
    • L. D. Xu, "Enterprise systems: State-of-the-art and future trends," IEEE Trans. Ind. Informat., vol. 7, no. 4, pp. 630-640, Nov. 2011.
    • (2011) IEEE Trans. Ind. Informat. , vol.7 , Issue.4 , pp. 630-640
    • Xu, L.D.1
  • 136
    • 84906834039 scopus 로고    scopus 로고
    • Internet of Things in industries: A survey
    • Nov
    • L. D. Xu, W. He, and S. Li, "Internet of Things in industries: A survey," IEEE Trans. Ind. Informat., vol. 10, no. 4, pp. 2233-2243, Nov. 2014.
    • (2014) IEEE Trans. Ind. Informat. , vol.10 , Issue.4 , pp. 2233-2243
    • Xu, L.D.1    He, W.2    Li, S.3
  • 137
    • 18144420462 scopus 로고    scopus 로고
    • Scan based side channel attack on dedicated hardware implementations of data encryption standard
    • Charlotte, NC, USA, Oct
    • B. Yang, K. Wu, and R. Karri, "Scan based side channel attack on dedicated hardware implementations of data encryption standard," in Proc. Int. Test Conf. (ITC), Charlotte, NC, USA, Oct. 2004, pp. 339-344.
    • (2004) Proc. Int. Test Conf. (ITC) , pp. 339-344
    • Yang, B.1    Wu, K.2    Karri, R.3
  • 138
    • 34248359563 scopus 로고    scopus 로고
    • RFID sensor network network architectures to integrate RFID, sensor and WSN
    • Mar
    • H. Yang and S.-H. Yang, "RFID sensor network network architectures to integrate RFID, sensor and WSN," Meas. Control, vol. 40, no. 2, pp. 56-59, Mar. 2007.
    • (2007) Meas. Control , vol.40 , Issue.2 , pp. 56-59
    • Yang, H.1    Yang, S.-H.2
  • 139
    • 84964896253 scopus 로고    scopus 로고
    • On false data injection attacks against Kalman filtering in power system dynamic state estimation
    • Jun
    • Q. Yang, L. Chang, and W. Yu, "On false data injection attacks against Kalman filtering in power system dynamic state estimation," Security Commun. Netw., vol. 9, no. 9, pp. 833-849, Jun. 2016.
    • (2016) Security Commun. Netw. , vol.9 , Issue.9 , pp. 833-849
    • Yang, Q.1    Chang, L.2    Yu, W.3
  • 140
    • 85018906264 scopus 로고    scopus 로고
    • On data integrity attacks against optimal power flow in power grid systems
    • Las Vegas, NV, USA
    • Q. Yang et al., "On data integrity attacks against optimal power flow in power grid systems," in Proc. Annu. IEEE Consumer Commun. Netw. Conf. (CCNC), Las Vegas, NV, USA, 2017.
    • (2017) Proc. Annu. IEEE Consumer Commun. Netw. Conf. (CCNC)
    • Yang, Q.1
  • 141
    • 84894537318 scopus 로고    scopus 로고
    • On false data-injection attacks against power system state estimation: Modeling and countermeasures
    • Mar
    • Q. Yang et al., "On false data-injection attacks against power system state estimation: Modeling and countermeasures," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 3, pp. 717-729, Mar. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.3 , pp. 717-729
    • Yang, Q.1
  • 142
    • 84981543761 scopus 로고    scopus 로고
    • Towards a low-cost remote memory attestation for the smart grid
    • Aug
    • X. Yang et al., "Towards a low-cost remote memory attestation for the smart grid," Sensors, vol. 15, no. 8, pp. 20799-20824, Aug. 2015.
    • (2015) Sensors , vol.15 , Issue.8 , pp. 20799-20824
    • Yang, X.1
  • 143
    • 84919466772 scopus 로고    scopus 로고
    • A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems
    • Jan
    • X. Yang et al., "A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems," IEEE Trans. Comput., vol. 64, no. 1, pp. 4-18, Jan. 2015.
    • (2015) IEEE Trans. Comput. , vol.64 , Issue.1 , pp. 4-18
    • Yang, X.1
  • 144
    • 84987899075 scopus 로고    scopus 로고
    • On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems
    • Oct
    • X. Yang, X. Ren, J. Lin, and W. Yu, "On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 10, pp. 2967-2983, Oct. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst. , vol.27 , Issue.10 , pp. 2967-2983
    • Yang, X.1    Ren, X.2    Lin, J.3    Yu, W.4
  • 145
    • 85013441181 scopus 로고    scopus 로고
    • Data integrity attacks against the distributed real-time pricing in the smart grid
    • Las Vegas, NV, USA
    • X. Yang et al., "Data integrity attacks against the distributed real-time pricing in the smart grid," in Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC), Las Vegas, NV, USA, 2016, pp. 1-8.
    • (2016) Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC) , pp. 1-8
    • Yang, X.1
  • 146
    • 85015246554 scopus 로고    scopus 로고
    • Toward a gaussianmixture model-based detection scheme against data integrity attacks in the smart grid
    • Feb
    • X. Yang, P. Zhao, X. Zhang, J. Lin, and W. Yu, "Toward a Gaussianmixture model-based detection scheme against data integrity attacks in the smart grid," IEEE Internet Things J., vol. 4, no. 1, pp. 147-161, Feb. 2017.
    • (2017) IEEE Internet Things J. , vol.4 , Issue.1 , pp. 147-161
    • Yang, X.1    Zhao, P.2    Zhang, X.3    Lin, J.4    Yu, W.5
  • 147
    • 84951050684 scopus 로고    scopus 로고
    • A survey of fog computing: Concepts, applications and issues
    • Hangzhou, China, Jun
    • S. Yi, C. Li, and Q. Li, "A survey of fog computing: Concepts, applications and issues," in Proc. Workshop Mobile Big Data, Hangzhou, China, Jun. 2015, pp. 37-42.
    • (2015) Proc. Workshop Mobile Big Data , pp. 37-42
    • Yi, S.1    Li, C.2    Li, Q.3
  • 149
    • 84919339871 scopus 로고    scopus 로고
    • An integrated detection system against false data injection attacks in the smart grid
    • W. Yu, D. Griffith, L. Ge, S. Bhattarai, and N. Golmie, "An integrated detection system against false data injection attacks in the smart grid," Security Commun. Netw., vol. 8, no. 2, pp. 91-109, 2015.
    • (2015) Security Commun. Netw. , vol.8 , Issue.2 , pp. 91-109
    • Yu, W.1    Griffith, D.2    Ge, L.3    Bhattarai, S.4    Golmie, N.5
  • 150
    • 20344390758 scopus 로고    scopus 로고
    • Query aggregation for providing efficient data services in sensor networks
    • Fort Lauderdale, FL, USA
    • W. Yu, T. N. Le, D. Xuan, and W. Zhao, "Query aggregation for providing efficient data services in sensor networks," in Proc. IEEE Mobile Ad-Hoc Sensor Syst. (MASS), Fort Lauderdale, FL, USA, 2004, pp. 31-40.
    • (2004) Proc. IEEE Mobile Ad-Hoc Sensor Syst. (MASS) , pp. 31-40
    • Yu, W.1    Le, T.N.2    Xuan, D.3    Zhao, W.4
  • 151
    • 85028754746 scopus 로고    scopus 로고
    • Efficient energy sensitive routing protocols in mobile ad-hoc networks
    • Las Vegas, NV, USA
    • W. Yu and J. Lee, "Efficient energy sensitive routing protocols in mobile ad-hoc networks," in Proc. Int. Conf. Wireless Netw., Las Vegas, NV, USA, 2002.
    • (2002) Proc. Int. Conf. Wireless Netw
    • Yu, W.1    Lee, J.2
  • 152
    • 85037031256 scopus 로고    scopus 로고
    • Cyber crime scene investigations (C2SI) through cloud computing
    • Washington, DC, USA
    • W. Yu, G. Xu, Z. Chen, and P. Moulema, "Cyber crime scene investigations (C2SI) through cloud computing," in Proc. IEEE Conf. Commun. Netw. Security (CNS), Washington, DC, USA, 2013, pp. 26-31.
    • (2013) Proc. IEEE Conf. Commun. Netw. Security (CNS) , pp. 26-31
    • Yu, W.1    Xu, G.2    Chen, Z.3    Moulema, P.4
  • 153
    • 85037059190 scopus 로고    scopus 로고
    • An integrated middleware-based solution for supporting secured dynamic-coalition applications in heterogeneous environments
    • West Point, NY, USA
    • W. Yu, D. Xuan, B. Graham, S. Santhanam, R. Bettati, and W. Zhao, "An integrated middleware-based solution for supporting secured dynamic-coalition applications in heterogeneous environments," in Proc. IEEE Workshop Inf. Assurance Security, West Point, NY, USA, 2002, pp. 259-264.
    • (2002) Proc. IEEE Workshop Inf. Assurance Security , pp. 259-264
    • Yu, W.1    Xuan, D.2    Graham, B.3    Santhanam, S.4    Bettati, R.5    Zhao, W.6
  • 154
    • 77956179239 scopus 로고    scopus 로고
    • Self-disciplinary worms and countermeasures: Modeling and analysis
    • Oct
    • W. Yu, N. Zhang, X. Fu, and W. Zhao, "Self-disciplinary worms and countermeasures: Modeling and analysis," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 10, pp. 1501-1514, Oct. 2010.
    • (2010) IEEE Trans. Parallel Distrib. Syst. , vol.21 , Issue.10 , pp. 1501-1514
    • Yu, W.1    Zhang, N.2    Fu, X.3    Zhao, W.4
  • 157
    • 78149317624 scopus 로고    scopus 로고
    • Differential power cryptanalysis attacks against present implementation
    • Chengdu, China, Aug
    • J. Zhang, D. Gu, Z. Guo, and L. Zhang, "Differential power cryptanalysis attacks against present implementation," in Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE), vol. 6. Chengdu, China, Aug. 2010, pp. V6-61-V6-65.
    • (2010) Proc. 3rd Int. Conf. Adv. Comput. Theory Eng. (ICACTE) , vol.6 , pp. V661-V665
    • Zhang, J.1    Gu, D.2    Guo, Z.3    Zhang, L.4
  • 158
    • 84908454906 scopus 로고    scopus 로고
    • Sybil attacks and their defenses in the Internet of Things
    • Oct
    • K. Zhang, X. Liang, R. Lu, and X. Shen, "Sybil attacks and their defenses in the Internet of Things," IEEE Internet Things J., vol. 1, no. 5, pp. 372-383, Oct. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.5 , pp. 372-383
    • Zhang, K.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 159
    • 84976496511 scopus 로고    scopus 로고
    • Fakemask: A novel privacy preserving approach for smartphones
    • Jun
    • L. Zhang, Z. Cai, and X. Wang, "Fakemask: A novel privacy preserving approach for smartphones," IEEE Trans. Netw. Service Manag., vol. 13, no. 2, pp. 335-348, Jun. 2016.
    • (2016) IEEE Trans. Netw. Service Manag. , vol.13 , Issue.2 , pp. 335-348
    • Zhang, L.1    Cai, Z.2    Wang, X.3
  • 160
    • 84964813261 scopus 로고    scopus 로고
    • Towards efficient and secured real-time pricing in the smart grid
    • San Diego, CA, USA, Dec
    • X. Zhang, X. Yang, J. Lin, G. Xu, and W. Yu, "Towards efficient and secured real-time pricing in the smart grid," in Proc. IEEE Glob. Commun. Conf. (GLOBECOM), San Diego, CA, USA, Dec. 2015, pp. 1-6.
    • (2015) Proc. IEEE Glob. Commun. Conf. (GLOBECOM) , pp. 1-6
    • Zhang, X.1    Yang, X.2    Lin, J.3    Xu, G.4    Yu, W.5
  • 161
    • 85006758502 scopus 로고    scopus 로고
    • On data integrity attacks against real-time pricing in energy-based cyber-physical systems
    • Jan
    • X. Zhang, X. Yang, J. Lin, G. Xu, and W. Yu, "On data integrity attacks against real-time pricing in energy-based cyber-physical systems," IEEE Trans. Parallel Distrib. Syst., vol. 28, no. 1, pp. 170-187, Jan. 2017.
    • (2017) IEEE Trans. Parallel Distrib. Syst. , vol.28 , Issue.1 , pp. 170-187
    • Zhang, X.1    Yang, X.2    Lin, J.3    Xu, G.4    Yu, W.5
  • 163
    • 84982290230 scopus 로고    scopus 로고
    • Anti-eavesdropping schemes for interference alignment (IA)-based wireless networks
    • Aug
    • N. Zhao, F. R. Yu, M. Li, and V. C. M. Leung, "Anti-eavesdropping schemes for interference alignment (IA)-based wireless networks," IEEE Trans. Wireless Commun., vol. 15, no. 8, pp. 5719-5732, Aug. 2016.
    • (2016) IEEE Trans. Wireless Commun. , vol.15 , Issue.8 , pp. 5719-5732
    • Zhao, N.1    Yu, F.R.2    Li, M.3    Leung, V.C.M.4
  • 164
    • 84863798861 scopus 로고    scopus 로고
    • Radio resource allocation in LTE-advanced cellular networks with m2m communications
    • Jul
    • K. Zheng, F. Hu, W. Wang, W. Xiang, and M. Dohler, "Radio resource allocation in LTE-advanced cellular networks with m2m communications," IEEE Commun. Mag., vol. 50, no. 7, pp. 184-192, Jul. 2012.
    • (2012) IEEE Commun. Mag. , vol.50 , Issue.7 , pp. 184-192
    • Zheng, K.1    Hu, F.2    Wang, W.3    Xiang, W.4    Dohler, M.5
  • 165
    • 85026410795 scopus 로고    scopus 로고
    • Location-privacy-aware review publication mechanism for local business service systems
    • Atlanta, GA, USA
    • X. Zheng, Z. Cai, J. Li, and H. Gao, "Location-privacy-aware review publication mechanism for local business service systems," in Proc. 36th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM), Atlanta, GA, USA, 2017, pp. 1-9.
    • (2017) Proc. 36th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM) , pp. 1-9
    • Zheng, X.1    Cai, Z.2    Li, J.3    Gao, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.