메뉴 건너뛰기




Volumn 4, Issue 5, 2017, Pages 1250-1258

A Survey on Security and Privacy Issues in Internet-of-Things

Author keywords

Internet of Things (IoT); privacy; security; survey

Indexed keywords

ACCESS CONTROL; COMPUTER PRIVACY; DATA PRIVACY; SURVEYING; SURVEYS;

EID: 85030314760     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2017.2694844     Document Type: Article
Times cited : (1013)

References (74)
  • 5
    • 85037053742 scopus 로고    scopus 로고
    • Talkin Cloud. (2016). IoT Past and Present: The History of IoT, and Where It's Headed Today. [Online]. Available: http://talkincloud.com/cloud-computing/iot-past-and-present-historyiot-and-where-its-headed-today?page=2
    • (2016)
    • Cloud, T.1
  • 6
    • 78751527354 scopus 로고    scopus 로고
    • A secure interconnection model for IPv6 enabled wireless sensor networks
    • Venice, Italy, Oct
    • J. Granjal, E. Monteiro, and J. S. Silva, "A secure interconnection model for IPv6 enabled wireless sensor networks," in Proc. IFIP Wireless Days, Venice, Italy, Oct. 2010, pp. 1-6.
    • (2010) Proc. IFIP Wireless Days , pp. 1-6
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 7
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in Internet of Things: The road ahead
    • Jan
    • S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Comput. Netw., vol. 76, pp. 146-164, Jan. 2015.
    • (2015) Comput. Netw. , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.3    Coen-Porisini, A.4
  • 8
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed Internet of Things
    • R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed Internet of Things," Comput. Netw., vol. 57, no. 10, pp. 2266-2279, 2013.
    • (2013) Comput. Netw. , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 9
    • 84922933943 scopus 로고    scopus 로고
    • Low-energy security: Limits and opportunities in the Internet of Things
    • Jan./Feb
    • W. Trappe, R. Howard, and R. S. Moore, "Low-energy security: Limits and opportunities in the Internet of Things," IEEE Security Privacy, vol. 13, no. 1, pp. 14-21, Jan./Feb. 2015.
    • (2015) IEEE Security Privacy , vol.13 , Issue.1 , pp. 14-21
    • Trappe, W.1    Howard, R.2    Moore, R.S.3
  • 14
    • 84978032627 scopus 로고    scopus 로고
    • Extended functionality attacks on IoT devices: The case of smart lights
    • Saarbrücken, Germany, Mar
    • E. Ronen and A. Shamir, "Extended functionality attacks on IoT devices: The case of smart lights," in Proc. IEEE Eur. Symp. Security Privacy (EuroS P), Saarbrücken, Germany, Mar. 2016, pp. 3-12.
    • (2016) Proc. IEEE Eur. Symp. Security Privacy (EuroS P) , pp. 3-12
    • Ronen, E.1    Shamir, A.2
  • 16
    • 84928029871 scopus 로고    scopus 로고
    • Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
    • Jul
    • P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications," in Int. J. Distrib. Sensor Netw., vol. 10, Jul. 2014, Art. no. 357430.
    • (2014) Int. J. Distrib. Sensor Netw. , vol.10
    • Porambage, P.1    Schmitt, C.2    Kumar, P.3    Gurtov, A.4    Ylianttila, M.5
  • 17
    • 84979650451 scopus 로고    scopus 로고
    • Smart locks: Lessons for securing commodity Internet of Things devices
    • Xi'an, China
    • G. Ho et al., "Smart locks: Lessons for securing commodity Internet of Things devices," in Proc. 11th ACM Asia Conf. Comput. Commun. Security (ASIA CCS), Xi'an, China, 2016, pp. 461-472.
    • (2016) Proc. 11th ACM Asia Conf. Comput. Commun. Security (Asia CCS) , pp. 461-472
    • Ho, G.1
  • 19
    • 84937792152 scopus 로고    scopus 로고
    • Communication security in Internet of Thing: Preventive measure and avoid DDoS attack over IoT network
    • San Diego, CA, USA
    • C. Zhang and R. Green, "Communication security in Internet of Thing: Preventive measure and avoid DDoS attack over IoT network," in Proc. 18th Symp. Commun. Netw. (CNS), San Diego, CA, USA, 2015, pp. 8-15.
    • (2015) Proc. 18th Symp. Commun. Netw. (CNS) , pp. 8-15
    • Zhang, C.1    Green, R.2
  • 23
    • 84964685739 scopus 로고    scopus 로고
    • Overcoming invasion of privacy in smart home environment with synthetic packet injection
    • Tokyo, Japan, Dec
    • K. Yoshigoe, W. Dai, M. Abramson, and A. Jacobs, "Overcoming invasion of privacy in smart home environment with synthetic packet injection," in Proc. TRON Symp. (TRONSHOW), Tokyo, Japan, Dec. 2015, pp. 1-7.
    • (2015) Proc. TRON Symp. (TRONSHOW) , pp. 1-7
    • Yoshigoe, K.1    Dai, W.2    Abramson, M.3    Jacobs, A.4
  • 26
    • 84916934620 scopus 로고    scopus 로고
    • IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios
    • Feb
    • S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. Ferrari, "IoT-OAS: An OAuth-based authorization service architecture for secure services in IoT scenarios," IEEE Sensors J., vol. 15, no. 2, pp. 1224-1234, Feb. 2015.
    • (2015) IEEE Sensors J. , vol.15 , Issue.2 , pp. 1224-1234
    • Cirani, S.1    Picone, M.2    Gonizzi, P.3    Veltri, L.4    Ferrari, G.5
  • 27
    • 84910149653 scopus 로고    scopus 로고
    • Security of the Internet of Things: Perspectives and challenges
    • Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, "Security of the Internet of Things: Perspectives and challenges," Wireless Netw., vol. 20, no. 8, pp. 2481-2501, 2014.
    • (2014) Wireless Netw. , vol.20 , Issue.8 , pp. 2481-2501
    • Jing, Q.1    Vasilakos, A.V.2    Wan, J.3    Lu, J.4    Qiu, D.5
  • 30
    • 42649126015 scopus 로고    scopus 로고
    • Intrusion detection in homogeneous and heterogeneous wireless sensor networks
    • Jun
    • Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, "Intrusion detection in homogeneous and heterogeneous wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 6, pp. 698-711, Jun. 2008.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.6 , pp. 698-711
    • Wang, Y.1    Wang, X.2    Xie, B.3    Wang, D.4    Agrawal, D.P.5
  • 32
    • 25844530844 scopus 로고    scopus 로고
    • New constructions on broadcast encryption key pre-distribution schemes
    • Miami, FL, USA, Mar
    • S. C.-H. Huang and D.-Z. Du, "New constructions on broadcast encryption key pre-distribution schemes," in Proc. IEEE 24th Annu. Joint Conf. Comput. Commun. Soc., vol. 1. Miami, FL, USA, Mar. 2005, pp. 515-523.
    • (2005) Proc. IEEE 24th Annu. Joint Conf. Comput. Commun. Soc. , vol.1 , pp. 515-523
    • Huang, S.C.-H.1    Du, D.-Z.2
  • 33
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Berkeley, CA, USA, May
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in Proc. Symp. Security Privacy, Berkeley, CA, USA, May 2003, pp. 197-213.
    • (2003) Proc. Symp. Security Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 35
    • 57449101619 scopus 로고    scopus 로고
    • Taxonomy and challenges of the integration of RFID and wireless sensor networks
    • Nov./Dec
    • H. Liu, M. Bolic, A. Nayak, and I. Stojmenovic, "Taxonomy and challenges of the integration of RFID and wireless sensor networks," IEEE Netw., vol. 22, no. 6, pp. 26-35, Nov./Dec. 2008.
    • (2008) IEEE Netw. , vol.22 , Issue.6 , pp. 26-35
    • Liu, H.1    Bolic, M.2    Nayak, A.3    Stojmenovic, I.4
  • 36
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • Miami, FL, USA, Mar
    • H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proc. IEEE 24th Annu. Joint Conf. Comput. Commun. Soc., vol. 1. Miami, FL, USA, Mar. 2005, pp. 524-535.
    • (2005) Proc. IEEE 24th Annu. Joint Conf. Comput. Commun. Soc. , vol.1 , pp. 524-535
    • Chan, H.1    Perrig, A.2
  • 38
    • 78650018339 scopus 로고    scopus 로고
    • Dissent: Accountable anonymous group messaging
    • Chicago, IL, USA
    • H. Corrigan-Gibbs and B. Ford, "Dissent: Accountable anonymous group messaging," in Proc. ACM CCS, Chicago, IL, USA, 2010, pp. 340-350.
    • (2010) Proc. ACM CCS , pp. 340-350
    • Corrigan-Gibbs, H.1    Ford, B.2
  • 40
    • 84889077410 scopus 로고    scopus 로고
    • Proactively accountable anonymous messaging in verdict
    • Washington, DC, USA
    • H. Corrigan-Gibbs, D. I. Wolinsky, and B. Ford, "Proactively accountable anonymous messaging in verdict," in Proc. USENIX Security, Washington, DC, USA, 2013, pp. 147-162.
    • (2013) Proc. USENIX Security , pp. 147-162
    • Corrigan-Gibbs, H.1    Wolinsky, D.I.2    Ford, B.3
  • 41
    • 84945180364 scopus 로고    scopus 로고
    • Riposte: An anonymous messaging system handling millions of users
    • San Jose, CA, USA
    • H. Corrigan-Gibbs, D. Boneh, and D. Mazières, "Riposte: An anonymous messaging system handling millions of users," in Proc. IEEE S P, San Jose, CA, USA, 2015, pp. 321-338.
    • (2015) Proc. IEEE S P , pp. 321-338
    • Corrigan-Gibbs, H.1    Boneh, D.2    Mazières, D.3
  • 42
    • 84861631303 scopus 로고    scopus 로고
    • Efficient anonymous message submission
    • Orlando, FL, USA, Mar
    • X. Zhao, L. Li, G. Xue, and G. Silva, "Efficient anonymous message submission," in Proc. IEEE INFOCOM, Orlando, FL, USA, Mar. 2012, pp. 2228-2236.
    • (2012) Proc. IEEE INFOCOM , pp. 2228-2236
    • Zhao, X.1    Li, L.2    Xue, G.3    Silva, G.4
  • 43
    • 84942328707 scopus 로고    scopus 로고
    • Anonymity-based privacypreserving data reporting for participatory sensing
    • Oct
    • Y. Yao, L. T. Yang, and N. N. Xiong, "Anonymity-based privacypreserving data reporting for participatory sensing," IEEE Internet Things J., vol. 2, no. 5, pp. 381-390, Oct. 2015.
    • (2015) IEEE Internet Things J. , vol.2 , Issue.5 , pp. 381-390
    • Yao, Y.1    Yang, L.T.2    Xiong, N.N.3
  • 44
    • 50249098733 scopus 로고    scopus 로고
    • Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
    • Oakland, CA, USA
    • D. Halperin et al., "Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses," in Proc. IEEE S&P, Oakland, CA, USA, 2008, pp. 129-142.
    • (2008) Proc. IEEE S&P , pp. 129-142
    • Halperin, D.1
  • 45
    • 80053973692 scopus 로고    scopus 로고
    • Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system
    • Columbia, MO, USA
    • C. Li, A. Raghunathan, and N. K. Jha, "Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system," in Proc. IEEE HealthCom, Columbia, MO, USA, 2011, pp. 150-156.
    • (2011) Proc. IEEE HealthCom , pp. 150-156
    • Li, C.1    Raghunathan, A.2    Jha, N.K.3
  • 46
    • 84885876349 scopus 로고    scopus 로고
    • Hacking medical devices for fun and insulin: Breaking the human SCADA system
    • J. Radcliffe, "Hacking medical devices for fun and insulin: Breaking the human SCADA system," in Proc. Black Hat USA, 2011, pp. 1-12.
    • (2011) Proc. Black Hat USA , pp. 1-12
    • Radcliffe, J.1
  • 51
    • 74049128234 scopus 로고    scopus 로고
    • Proximity-based access control for implantable medical devices
    • Chicago, IL, USA
    • K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, "Proximity-based access control for implantable medical devices," in Proc. ACM CCS, Chicago, IL, USA, 2009, pp. 410-419.
    • (2009) Proc. ACM CCS , pp. 410-419
    • Rasmussen, K.B.1    Castelluccia, C.2    Heydt-Benjamin, T.S.3    Capkun, S.4
  • 52
    • 79960856885 scopus 로고    scopus 로고
    • Biometric-based two-level secure access control for implantable medical devices during emergencies
    • Shanghai, China
    • X. Hei and X. Du, "Biometric-based two-level secure access control for implantable medical devices during emergencies," in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 346-350.
    • (2011) Proc. IEEE INFOCOM , pp. 346-350
    • Hei, X.1    Du, X.2
  • 53
    • 79960873920 scopus 로고    scopus 로고
    • Imdguard: Securing implantable medical devices with the external wearable guardian
    • Shanghai, China
    • F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, "Imdguard: Securing implantable medical devices with the external wearable guardian," in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 1862-1870.
    • (2011) Proc. IEEE INFOCOM , pp. 1862-1870
    • Xu, F.1    Qin, Z.2    Tan, C.C.3    Wang, B.4    Li, Q.5
  • 54
    • 84888984313 scopus 로고    scopus 로고
    • Heart-to-heart (H2H): Authentication for implanted medical devices
    • Berlin, Germany
    • M. Rostami, A. Juels, and F. Koushanfar, "Heart-to-heart (H2H): Authentication for implanted medical devices," in Proc. ACM CCS, Berlin, Germany, 2013, pp. 1099-1112.
    • (2013) Proc. ACM CCS , pp. 1099-1112
    • Rostami, M.1    Juels, A.2    Koushanfar, F.3
  • 55
    • 84883076209 scopus 로고    scopus 로고
    • PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system
    • Turin, Italy
    • X. Hei, X. Du, S. Lin, and I. Lee, "PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system," in Proc. IEEE INFOCOM, Turin, Italy, 2013, pp. 3030-3038.
    • (2013) Proc. IEEE INFOCOM , pp. 3030-3038
    • Hei, X.1    Du, X.2    Lin, S.3    Lee, I.4
  • 56
    • 84958753717 scopus 로고    scopus 로고
    • Poster: Near field communication based access control for wireless medical devices
    • Philadelphia, PA, USA
    • X. Hei, X. Du, and S. Lin, "Poster: Near field communication based access control for wireless medical devices," in Proc. ACM MobiHoc, Philadelphia, PA, USA, 2014, pp. 423-424.
    • (2014) Proc. ACM MobiHoc , pp. 423-424
    • Hei, X.1    Du, X.2    Lin, S.3
  • 57
    • 84907005557 scopus 로고    scopus 로고
    • A non-key based security scheme supporting emergency treatment of wireless implants
    • Sydney, NSW, Australia
    • G. Zheng, G. Fang, M. A. Orgun, and R. Shankaran, "A non-key based security scheme supporting emergency treatment of wireless implants," in Proc. IEEE ICC, Sydney, NSW, Australia, 2014, pp. 647-652.
    • (2014) Proc. IEEE ICC , pp. 647-652
    • Zheng, G.1    Fang, G.2    Orgun, M.A.3    Shankaran, R.4
  • 58
    • 79551649543 scopus 로고    scopus 로고
    • Defending resource depletion attacks on implantable medical devices
    • Miami, FL, USA
    • X. Hei, X. Du, J. Wu, and F. Hu, "Defending resource depletion attacks on implantable medical devices," in Proc. IEEE GLOBECOM, Miami, FL, USA, 2010, pp. 1-5.
    • (2010) Proc. IEEE GLOBECOM , pp. 1-5
    • Hei, X.1    Du, X.2    Wu, J.3    Hu, F.4
  • 59
    • 77950466988 scopus 로고    scopus 로고
    • Secure wake-up scheme for WBANs
    • Apr
    • J. Liu, M. A. Ameen, and K. S. Kwak, "Secure wake-up scheme for WBANs," IEICE Trans. Commun., vol. 93-B, no. 4, pp. 854-857, Apr. 2010.
    • (2010) IEICE Trans. Commun. , vol.93-B , Issue.4 , pp. 854-857
    • Liu, J.1    Ameen, M.A.2    Kwak, K.S.3
  • 61
    • 84911865485 scopus 로고    scopus 로고
    • Secure communication for the Internet of Things-A comparison of link-layer security and IPsec for 6LoWPAN
    • S. Raza, S. Duquennoy, J. Hoglund, U. Roedig, and T. Voigt, "Secure communication for the Internet of Things-A comparison of link-layer security and IPsec for 6LoWPAN," Security Commun. Netw., vol. 7, no. 12, pp. 2654-2668, 2014.
    • (2014) Security Commun. Netw. , vol.7 , Issue.12 , pp. 2654-2668
    • Raza, S.1    Duquennoy, S.2    Hoglund, J.3    Roedig, U.4    Voigt, T.5
  • 63
    • 84885304488 scopus 로고    scopus 로고
    • DTLS based security and two-way authentication for the Internet of Things
    • Nov
    • T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, and G. Carle, "DTLS based security and two-way authentication for the Internet of Things," Ad Hoc Netw., vol. 11, no. 8, pp. 2710-2723, Nov. 2013.
    • (2013) Ad Hoc Netw. , vol.11 , Issue.8 , pp. 2710-2723
    • Kothmayr, T.1    Schmitt, C.2    Hu, W.3    Brünig, M.4    Carle, G.5
  • 65
    • 84883314073 scopus 로고    scopus 로고
    • Lithe: Lightweight secure CoAP for the Internet of Things
    • Oct
    • S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight secure CoAP for the Internet of Things," IEEE Sensors J., vol. 13, no. 10, pp. 3711-3720, Oct. 2013.
    • (2013) IEEE Sensors J. , vol.13 , Issue.10 , pp. 3711-3720
    • Raza, S.1    Shafagh, H.2    Hewage, K.3    Hummen, R.4    Voigt, T.5
  • 68
    • 85037054987 scopus 로고    scopus 로고
    • Mirai
    • Wikipedia. (2016). Mirai. [Online]. Available: https://en.wikipedia.org/wiki/Mirai(malware)
    • (2016)
  • 70
    • 34147186198 scopus 로고    scopus 로고
    • A pattern recognition scheme for distributed denial of service (DDoS) attacks in wireless sensor networks
    • Hong Kong
    • Z. A. Baig, M. Baqer, and A. I. Khan, "A pattern recognition scheme for distributed denial of service (DDoS) attacks in wireless sensor networks," in Proc. 18th Int. Conf. Pattern Recognit. (ICPR), vol. 3. Hong Kong, 2006, pp. 1050-1054.
    • (2006) Proc. 18th Int. Conf. Pattern Recognit. (ICPR) , vol.3 , pp. 1050-1054
    • Baig, Z.A.1    Baqer, M.2    Khan, A.I.3
  • 71
    • 51249105540 scopus 로고    scopus 로고
    • Defending DoS attacks on broadcast authentication in wireless sensor networks
    • Beijing, China, May
    • X. Du, M. Guizani, Y. Xiao, and H.-H. Chen, "Defending DoS attacks on broadcast authentication in wireless sensor networks," in Proc. IEEE Int. Conf. Commun., Beijing, China, May 2008, pp. 1653-1657.
    • (2008) Proc. IEEE Int. Conf. Commun , pp. 1653-1657
    • Du, X.1    Guizani, M.2    Xiao, Y.3    Chen, H.-H.4
  • 72
    • 77951603456 scopus 로고    scopus 로고
    • A scheme for preventing denial of service attacks on wireless sensor networks
    • Porto, Portugal, Nov
    • K. Gill and S.-H. Yang, "A scheme for preventing denial of service attacks on wireless sensor networks," in Proc. 35th Annu. Conf. IEEE Ind. Electron., Porto, Portugal, Nov. 2009, pp. 2603-2609.
    • (2009) Proc. 35th Annu. Conf. IEEE Ind. Electron. , pp. 2603-2609
    • Gill, K.1    Yang, S.-H.2
  • 73
    • 80155134907 scopus 로고    scopus 로고
    • Mitigating denial of service attacks in hierarchical wireless sensor networks
    • R. Nanda and P. V. Krishna, "Mitigating denial of service attacks in hierarchical wireless sensor networks," Netw. Security, vol. 2011, no. 10, pp. 14-18, 2011.
    • (2011) Netw. Security , vol.2011 , Issue.10 , pp. 14-18
    • Nanda, R.1    Krishna, P.V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.