메뉴 건너뛰기




Volumn , Issue , 2017, Pages 81-88

EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security

Author keywords

Edge Computing; Internet of Things; IoT; Security; Smart Homes

Indexed keywords

AUTOMATION; INTELLIGENT BUILDINGS;

EID: 85030309913     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICFEC.2017.7     Document Type: Conference Paper
Times cited : (56)

References (28)
  • 1
    • 79951801836 scopus 로고    scopus 로고
    • Iot gateway: Bridging wireless sensor networks into internet of things
    • Dec.
    • Q. Zhu, R. Wang, Q. Chen, Y. Liu, and W. Qin, "Iot gateway: Bridging wireless sensor networks into internet of things," in Proceedings of EUC 2010, Dec 2010.
    • (2010) Proceedings of EUC 2010
    • Zhu, Q.1    Wang, R.2    Chen, Q.3    Liu, Y.4    Qin, W.5
  • 2
    • 84866409323 scopus 로고    scopus 로고
    • April, [online; accessed 16-Septemeber-2016]
    • D. Evans, "The internet of things," https://www.cisco.com/c/dam/en us/about/ac79/docs/innov/IoT IBSG 0411FINAL.pdf, April 2011, [online; accessed 16-Septemeber-2016].
    • (2011) The Internet of Things
    • Evans, D.1
  • 4
    • 84876943063 scopus 로고    scopus 로고
    • Internet of things (iot): A vision, architectural elements, and future directions
    • J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of things (iot): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1    Buyya, R.2    Marusic, S.3    Palaniswami, M.4
  • 5
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • Sept
    • R. Roman, P. Najera, and J. Lopez, "Securing the internet of things," Computer, vol. 44, no. 9, pp. 51-58, Sept 2011.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 7
    • 85032277654 scopus 로고    scopus 로고
    • Security in internet of things: Opportunities and challenges
    • Oct.
    • K. Sha, W. Wei, A. Yang, and W. Shi, "Security in internet of things: Opportunities and challenges," in Proceedings of IIKI 2016, Oct 2016.
    • (2016) Proceedings of IIKI 2016
    • Sha, K.1    Wei, W.2    Yang, A.3    Shi, W.4
  • 8
    • 84900625968 scopus 로고    scopus 로고
    • A survey on the internet of things security
    • Dec.
    • K. Zhao and L. Ge, "A survey on the internet of things security," in Proceedings of CIS 2013, Dec 2013.
    • (2013) Proceedings of CIS 2013
    • Zhao, K.1    Ge, L.2
  • 9
    • 84964522790 scopus 로고    scopus 로고
    • Towards a model of privacy and security for smart homes
    • Dec.
    • A. Jacobsson and P. Davidsson, "Towards a model of privacy and security for smart homes," in Proceedings of WF-IoT 2015, Dec 2015.
    • (2015) Proceedings of WF-IoT 2015
    • Jacobsson, A.1    Davidsson, P.2
  • 11
    • 84921461758 scopus 로고    scopus 로고
    • Securing smart home: Technologies, security challenges, and security requirements
    • IEEE
    • C. Lee, L. Zappaterra, K. Choi, and H.-A. Choi, "Securing smart home: Technologies, security challenges, and security requirements," in Proceedings of IEEE CNS 2014. IEEE, 2014.
    • (2014) Proceedings of IEEE CNS 2014
    • Lee, C.1    Zappaterra, L.2    Choi, K.3    Choi, H.-A.4
  • 15
    • 85027254642 scopus 로고    scopus 로고
    • NIST, August, [online; accessed 16-Septemeber-2016]
    • NIST, "Report on lightweight cryptography," http://csrc.nist.gov/publications/drafts/nistir-8114/nistir 8114 draft.pdf, August 2016, [online; accessed 16-Septemeber-2016].
    • (2016) Report on Lightweight Cryptography
  • 16
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Feb.
    • N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A study of the energy consumption characteristics of cryptographic algorithms and security protocols," IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 128-143, Feb 2006.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 17
    • 84883314073 scopus 로고    scopus 로고
    • Lithe: Lightweight secure coap for the internet of things
    • Oct.
    • S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight secure coap for the internet of things," IEEE Sensors Journal, vol. 13, no. 10, pp. 3711-3720, Oct 2013.
    • (2013) IEEE Sensors Journal , vol.13 , Issue.10 , pp. 3711-3720
    • Raza, S.1    Shafagh, H.2    Hewage, K.3    Hummen, R.4    Voigt, T.5
  • 19
    • 85037101633 scopus 로고    scopus 로고
    • A secure and efficient framework to read isolated smart grid devices
    • K. Sha, N. Alatrash, and Z. Wang, "A secure and efficient framework to read isolated smart grid devices," IEEE Transactions on Smart Grid, vol. PP, no. 99, pp. 1-13, 2016.
    • (2016) IEEE Transactions on Smart Grid , vol.PP , Issue.99 , pp. 1-13
    • Sha, K.1    Alatrash, N.2    Wang, Z.3
  • 20
    • 33746613037 scopus 로고    scopus 로고
    • Internet Requests for Comments, RFC Editor, RFC 6347, Jan. [Online]
    • E. Rescorla and N. Modadugu, "Datagram Transport Layer Security Version 1.2," Internet Requests for Comments, RFC Editor, RFC 6347, Jan 2012. [Online]. Available: https://tools.ietf.org/html/rfc6347
    • (2012) Datagram Transport Layer Security Version 1.2
    • Rescorla, E.1    Modadugu, N.2
  • 21
    • 83055185853 scopus 로고    scopus 로고
    • Internet Requests for Comments, RFC Editor, RFC, Jan. [Online]
    • R. Moskowitz and R. Hummen, "HIP Diet EXchange (DEX)," Internet Requests for Comments, RFC Editor, RFC, Jan 2016. [Online]. Available: https://tools.ietf.org/html/draft-moskowitz-hip-dex-05
    • (2016) HIP Diet EXchange (DEX)
    • Moskowitz, R.1    Hummen, R.2
  • 23
    • 84874293263 scopus 로고    scopus 로고
    • A dtls based end-to-end security architecture for the internet of things with two-way authentication
    • Oct.
    • T. Kothmayr, C. Schmitt, W. Hu, M. Brnig, and G. Carle, "A dtls based end-to-end security architecture for the internet of things with two-way authentication," in Proceedings of LCN Workshops 2012, Oct 2012.
    • (2012) Proceedings of LCN Workshops 2012
    • Kothmayr, T.1    Schmitt, C.2    Hu, W.3    Brnig, M.4    Carle, G.5
  • 24
    • 84896280670 scopus 로고    scopus 로고
    • Lightweight collaborative key establishment scheme for the internet of things
    • Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, "Lightweight collaborative key establishment scheme for the internet of things," Computer Networks, vol. 64, pp. 273-295, 2014.
    • (2014) Computer Networks , vol.64 , pp. 273-295
    • Saied, Y.B.1    Olivereau, A.2    Zeghlache, D.3    Laurent, M.4
  • 25
    • 85009753144 scopus 로고    scopus 로고
    • A novel authentication and key agreement protocol for internet of things based resource-constrained body area sensors
    • Aug.
    • M. A. Iqbal and M. Bayoumi, "A novel authentication and key agreement protocol for internet of things based resource-constrained body area sensors," in Proceedings of FiCloud Workshop 2016, Aug 2016.
    • (2016) Proceedings of FiCloud Workshop 2016
    • Iqbal, M.A.1    Bayoumi, M.2
  • 26
    • 84963721336 scopus 로고    scopus 로고
    • A distributed security mechanism for resourceconstrained iot devices
    • J. King and A. I. Awad, "A distributed security mechanism for resourceconstrained iot devices," Informatica, vol. 40, no. 1, 2016.
    • (2016) Informatica , vol.40 , Issue.1
    • King, J.1    Awad, A.I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.