메뉴 건너뛰기




Volumn 2018-January, Issue , 2016, Pages 512-518

Security in Internet of Things: Opportunities and Challenges

Author keywords

Challenges; IoT; Security

Indexed keywords

CYBERSECURITY;

EID: 85032277654     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IIKI.2016.35     Document Type: Conference Paper
Times cited : (28)

References (27)
  • 2
    • 27744595750 scopus 로고    scopus 로고
    • Toward a smart grid: Power delivery for the 21st century
    • M. Amin and W. Bruce, "Toward a smart grid: power delivery for the 21st century, " IEEE Power and energy Magazine, vol. 3, no. 5, pp. 34-41, 2005.
    • (2005) IEEE Power and Energy Magazine , vol.3 , Issue.5 , pp. 34-41
    • Amin, M.1    Bruce, W.2
  • 5
    • 85027258733 scopus 로고    scopus 로고
    • "Your hackable house." [Online]. Available: http://money.cnn.com/interactive/technology/hackable-house/
    • Your Hackable House
  • 8
    • 84878618952 scopus 로고    scopus 로고
    • The essence of future smart houses: From embedding ict to adapting to sustainability principles
    • A. GhaffarianHoseini et al., "The essence of future smart houses: From embedding ict to adapting to sustainability principles, " Renewable and Sustainable Energy Reviews, vol. 24, no. 1, pp. 593-607, 2013.
    • (2013) Renewable and Sustainable Energy Reviews , vol.24 , Issue.1 , pp. 593-607
    • Ghaffarian Hoseini, A.1
  • 9
    • 84995633348 scopus 로고    scopus 로고
    • Smart transportation networks drive gains
    • S. Greengard, "Smart transportation networks drive gains, " Communications of the ACM, vol. 58, no. 1, pp. 25-27, 2015.
    • (2015) Communications of the ACM , vol.58 , Issue.1 , pp. 25-27
    • Greengard, S.1
  • 10
    • 84876943063 scopus 로고    scopus 로고
    • Internet of things (iot): A vision, architectural elements, and future directions
    • J. Gubbi et al., "Internet of things (iot): A vision, architectural elements, and future directions, " Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
    • (2013) Future Generation Computer Systems , vol.29 , Issue.7 , pp. 1645-1660
    • Gubbi, J.1
  • 11
    • 83555176391 scopus 로고    scopus 로고
    • Security challenges in the IP-based internet of things
    • T. Heer et al., "Security challenges in the ip-based internet of things, " Wireless Personal Communications, vol. 61, no. 3, pp. 527-542, 2011.
    • (2011) Wireless Personal Communications , vol.61 , Issue.3 , pp. 527-542
    • Heer, T.1
  • 14
    • 84910149653 scopus 로고    scopus 로고
    • Security of the internet of things: Perspectives and challenges
    • Q. Jing et al., "Security of the internet of things: Perspectives and challenges, " Wireless Networks, vol. 20, no. 8, pp. 2481-2501, 2014.
    • (2014) Wireless Networks , vol.20 , Issue.8 , pp. 2481-2501
    • Jing, Q.1
  • 16
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • A. L. L. Atzori and G. Morabito, "The internet of things: A survey, " Computer networks, vol. 54, no. 15, pp. 2787-2805, 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, A.L.L.1    Morabito, G.2
  • 17
    • 84887997518 scopus 로고    scopus 로고
    • Enhancing the attacking efficiency of the node capture attack in WSN: A matrix approach
    • C. Lin and G. Wu, "Enhancing the attacking efficiency of the node capture attack in wsn: A matrix approach, " The Journal of Supercomputing, vol. 66, no. 2, pp. 989-1007, 2013.
    • (2013) The Journal of Supercomputing , vol.66 , Issue.2 , pp. 989-1007
    • Lin, C.1    Wu, G.2
  • 18
    • 84872015191 scopus 로고    scopus 로고
    • Byod security challenges: Control and protect your most sensitive data
    • B. Morrow, "Byod security challenges: control and protect your most sensitive data, " Network Security, vol. 2012, no. 12, pp. 5-8, 2012.
    • (2012) Network Security , vol.2012 , Issue.12 , pp. 5-8
    • Morrow, B.1
  • 19
    • 84879082499 scopus 로고    scopus 로고
    • Trace analysis and mining for smart cities: Issues, methods, and applications
    • G. Pan et al., "Trace analysis and mining for smart cities: issues, methods, and applications, " IEEE Communications Magazine, vol. 121, no. 6, pp. 120-126, 2015.
    • (2015) IEEE Communications Magazine , vol.121 , Issue.6 , pp. 120-126
    • Pan, G.1
  • 20
    • 84885328301 scopus 로고    scopus 로고
    • Svelte: Real-Time intrusion detection in the internet of things
    • S. Raza, L. Wallgren, and T. Voigt, "Svelte: Real-Time intrusion detection in the internet of things, " Ad Hoc Networks, vol. 11, no. 8, pp. 2661-2674, 2013.
    • (2013) Ad Hoc Networks , vol.11 , Issue.8 , pp. 2661-2674
    • Raza, S.1    Wallgren, L.2    Voigt, T.3
  • 21
    • 84879225866 scopus 로고    scopus 로고
    • On the features and challenges of security and privacy in distributed internet of things
    • R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed internet of things, " Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013.
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 22
    • 85037101633 scopus 로고    scopus 로고
    • A secure and efficient framework to read isolated smart grid devices
    • K. Sha, N. Alatrash, and Z. Wang, "A secure and efficient framework to read isolated smart grid devices, " IEEE Transactions on Smart Grid, vol. pp, no. 99, pp. 1-13, 2016.
    • (2016) IEEE Transactions on Smart Grid , Issue.99 , pp. 1-13
    • Sha, K.1    Alatrash, N.2    Wang, Z.3
  • 23
    • 84969922595 scopus 로고    scopus 로고
    • The promise of edge computing
    • W. Shi and S. Dustdar, "The promise of edge computing, " IEEE Computer Magazine, vol. 29, no. 5, pp. 78-81, 2016.
    • (2016) IEEE Computer Magazine , vol.29 , Issue.5 , pp. 78-81
    • Shi, W.1    Dustdar, S.2
  • 26
    • 85043706761 scopus 로고    scopus 로고
    • The magic of RFID
    • Oct
    • R. Wang, "The magic of RFID, " ACM Queue, vol. 2, no. 7, pp. 41-48, Oct. 2004.
    • (2004) ACM Queue , vol.2 , Issue.7 , pp. 41-48
    • Wang, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.