메뉴 건너뛰기




Volumn 82, Issue , 2018, Pages 395-411

IoT security: Review, blockchain solutions, and open challenges

Author keywords

Blockchain; Data security; IoT protocols; IoT security; Network security

Indexed keywords

AUTOMATION; DIGITAL STORAGE; INTELLIGENT BUILDINGS; INTERNET OF THINGS; INTERNET PROTOCOLS; NETWORK ARCHITECTURE; NETWORK PROTOCOLS; SECURITY OF DATA; SMART CITY;

EID: 85035321551     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2017.11.022     Document Type: Article
Times cited : (2043)

References (136)
  • 1
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Atzori, L., Iera, A., Morabito, G., The internet of things: A survey. Comput. Netw. 54:15 (2010), 2787–2805.
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
    • 85042007199 scopus 로고    scopus 로고
    • Lenovo shows off a pair of intel-powered smart shoes. URL
    • B. Heater, Lenovo shows off a pair of intel-powered smart shoes, 2016. URL https://techcrunch.com/2016/06/09/lenovo-smart-shoes/.
    • (2016)
    • Heater, B.1
  • 4
    • 85042033926 scopus 로고    scopus 로고
    • Internet of things. URL
    • M. Rouse, I. Wigmore, Internet of things, 2016. URL http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT.
    • (2016)
    • Rouse, M.1    Wigmore, I.2
  • 5
    • 85028719579 scopus 로고    scopus 로고
    • Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions
    • Khan, A.A., Rehmani, M.H., Rachedi, A., Cognitive-radio-based internet of things: Applications, architectures, spectrum related functionalities, and future research directions. IEEE Wirel. Commun. 24:3 (2017), 17–25, 10.1109/MWC.2017.1600404.
    • (2017) IEEE Wirel. Commun. , vol.24 , Issue.3 , pp. 17-25
    • Khan, A.A.1    Rehmani, M.H.2    Rachedi, A.3
  • 6
    • 84960418981 scopus 로고    scopus 로고
    • White space: Definitional perspectives and their role in exploiting spectrum opportunities
    • Akhtar, F., Rehmani, M.H., Reisslein, M., White space: Definitional perspectives and their role in exploiting spectrum opportunities. Telecommun. Policy 40:4 (2016), 319–331, 10.1016/j.telpol.2016.01.003.
    • (2016) Telecommun. Policy , vol.40 , Issue.4 , pp. 319-331
    • Akhtar, F.1    Rehmani, M.H.2    Reisslein, M.3
  • 8
    • 84938672829 scopus 로고    scopus 로고
    • Security for the internet of things: A Survey of existing protocols and open research issues
    • Granjal, J., Monteiro, E., Silva, J.S., Security for the internet of things: A Survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17:3 (2015), 1294–1312, 10.1109/COMST.2015.2388550.
    • (2015) IEEE Commun. Surv. Tutor. , vol.17 , Issue.3 , pp. 1294-1312
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 9
    • 79955712919 scopus 로고    scopus 로고
    • Key management systems for sensor networks in the context of the internet of things
    • Modern Trends in Applied Security: Architectures, Implementations and Applications
    • Roman, R., Alcaraz, C., Lopez, J., Sklavos, N., Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 37:2 (2011), 147–159 Modern Trends in Applied Security: Architectures, Implementations and Applications.
    • (2011) Comput. Electr. Eng. , vol.37 , Issue.2 , pp. 147-159
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3    Sklavos, N.4
  • 11
    • 84880413059 scopus 로고    scopus 로고
    • Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview
    • Cirani, S., Ferrari, G., Veltri, L., Enforcing security mechanisms in the IP-based internet of things: An algorithmic overview. Algorithms 6:2 (2013), 197–226, 10.3390/a6020197.
    • (2013) Algorithms , vol.6 , Issue.2 , pp. 197-226
    • Cirani, S.1    Ferrari, G.2    Veltri, L.3
  • 12
    • 84894652457 scopus 로고    scopus 로고
    • A survey of intrusion detection systems in wireless sensor networks
    • Butun, I., Morgera, S.D., Sankar, R., A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16:1 (2014), 266–282, 10.1109/SURV.2013.050113.00191.
    • (2014) IEEE Commun. Surv. Tutor. , vol.16 , Issue.1 , pp. 266-282
    • Butun, I.1    Morgera, S.D.2    Sankar, R.3
  • 13
    • 84881313532 scopus 로고    scopus 로고
    • On the vital areas of intrusion detection systems in wireless sensor networks
    • Abduvaliyev, A., Pathan, A.-S.K., Zhou, J., Roman, R., Wong, W.-C., On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 15:3 (2013), 1223–1237, 10.1109/SURV.2012.121912.00006.
    • (2013) IEEE Commun. Surv. Tutor. , vol.15 , Issue.3 , pp. 1223-1237
    • Abduvaliyev, A.1    Pathan, A.-S.K.2    Zhou, J.3    Roman, R.4    Wong, W.-C.5
  • 14
    • 84900637145 scopus 로고    scopus 로고
    • Review: a survey of intrusion detection in wireless network applications
    • Mitchell, R., Chen, I.-R., Review: a survey of intrusion detection in wireless network applications. Comput. Commun. 42 (2014), 1–23, 10.1016/j.comcom.2014.01.012.
    • (2014) Comput. Commun. , vol.42 , pp. 1-23
    • Mitchell, R.1    Chen, I.-R.2
  • 15
    • 85041774197 scopus 로고    scopus 로고
    • Security and privacy issues of fog computing: A survey
    • Wireless Algorithms, Systems, and Applications the 10th International Conference on
    • S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: A survey, in: Wireless Algorithms, Systems, and Applications the 10th International Conference on, 2015, pp. 1–10.
    • (2015) , pp. 1-10
    • Yi, S.1    Qin, Z.2    Li, Q.3
  • 17
    • 84919372488 scopus 로고    scopus 로고
    • Security, privacy and trust in internet of things: The road ahead
    • Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A., Security, privacy and trust in internet of things: The road ahead. Comput. Netw. 76:Suppl. C (2015), 146–164, 10.1016/j.comnet.2014.11.008.
    • (2015) Comput. Netw. , vol.76 , pp. 146-164
    • Sicari, S.1    Rizzardi, A.2    Grieco, L.3    Coen-Porisini, A.4
  • 18
    • 85008245198 scopus 로고    scopus 로고
    • Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
    • Roman, R., Lopez, J., Mambo, M., Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst., 2016, 10.1016/j.future.2016.11.009.
    • (2016) Future Gener. Comput. Syst.
    • Roman, R.1    Lopez, J.2    Mambo, M.3
  • 20
    • 85009959911 scopus 로고    scopus 로고
    • Security and privacy for cloud-based IoT: Challenges
    • Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V., Security and privacy for cloud-based IoT: Challenges. IEEE Commun. Mag. 55:1 (2017), 26–33, 10.1109/MCOM.2017.1600363CM.
    • (2017) IEEE Commun. Mag. , vol.55 , Issue.1 , pp. 26-33
    • Zhou, J.1    Cao, Z.2    Dong, X.3    Vasilakos, A.V.4
  • 22
    • 85042013308 scopus 로고    scopus 로고
    • IoT-A, Internet of Things–Architecture IoT-A Deliverable D1.5 –Final architectural reference model for the IoT v3.0. URL
    • IoT-A, Internet of Things–Architecture IoT-A Deliverable D1.5 –Final architectural reference model for the IoT v3.0, 2013. URL http://iotforum.org/wp-content/uploads/2014/09/D1.5-20130715-VERYFINAL.pdf.
    • (2013)
  • 23
    • 85042031482 scopus 로고    scopus 로고
    • Top IoT Vulnerabilities. URL
    • OWASP, Top IoT Vulnerabilities, 2016. URL https://www.owasp.org/index.php/Top_IoT_Vulnerabilities.
    • (2016)
    • OWASP1
  • 24
    • 85042055527 scopus 로고    scopus 로고
    • IeEEE Standard for Local and metropolitan networks–Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs). URL
    • IEEE, IeEEE Standard for Local and metropolitan networks–Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs), 2012. URL https://standards.ieee.org/findstds/standard/802.15.4-2011.html.
    • (2012)
    • IEEE1
  • 25
    • 85041992929 scopus 로고    scopus 로고
    • Rfc 6550 - rpl: ipv6 routing protocol for low-power and lossy networks. URL
    • T. Winter, P. Thubert, A. Brandt, J.W. Hui, R. Kelsey, Rfc 6550 - rpl: ipv6 routing protocol for low-power and lossy networks, 2012. URL https://tools.ietf.org/html/rfc6550.
    • (2012)
    • Winter, T.1    Thubert, P.2    Brandt, A.3    Hui, J.W.4    Kelsey, R.5
  • 26
    • 85041999431 scopus 로고
    • User datagram protocol. URL
    • J. Postel, User datagram protocol, 1980. URL https://tools.ietf.org/html/rfc768.
    • (1980)
    • Postel, J.1
  • 27
    • 85042016297 scopus 로고    scopus 로고
    • Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. URL
    • J.W. Hui, P. Thubert, Compression format for IPv6 datagrams over IEEE 802.15.4-based networks, 2011. URL https://tools.ietf.org/html/rfc6282.
    • (2011)
    • Hui, J.W.1    Thubert, P.2
  • 28
    • 85042044241 scopus 로고    scopus 로고
    • Internet control message protocol (ICMPv6) for the internet protocol version 6 (IPv6) specification. URL
    • A. Conta, S. Deering, M. Gupta, Internet control message protocol (ICMPv6) for the internet protocol version 6 (IPv6) specification, 2006. URL https://tools.ietf.org/html/rfc4443.
    • (2006)
    • Conta, A.1    Deering, S.2    Gupta, M.3
  • 29
    • 85042019807 scopus 로고    scopus 로고
    • The constrained application protocol (CoAP). URL
    • Z. Shelby, K. Hartke, C. Bormann, The constrained application protocol (CoAP), 2014. URL https://tools.ietf.org/html/rfc7252.
    • (2014)
    • Shelby, Z.1    Hartke, K.2    Bormann, C.3
  • 31
    • 29844445404 scopus 로고    scopus 로고
    • Low-power DoS attacks in data wireless LANs and countermeasures
    • Noubir, G., Lin, G., Low-power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 7:3 (2003), 29–30.
    • (2003) SIGMOBILE Mob. Comput. Commun. Rev. , vol.7 , Issue.3 , pp. 29-30
    • Noubir, G.1    Lin, G.2
  • 32
    • 84907451520 scopus 로고    scopus 로고
    • Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone
    • Chae, S.H., Choi, W., Lee, J.H., Quek, T.Q.S., Enhanced secrecy in stochastic wireless networks: Artificial noise with secrecy protected zone. Trans. Info. for. Sec. 9:10 (2014), 1617–1628, 10.1109/TIFS.2014.2341453.
    • (2014) Trans. Info. for. Sec. , vol.9 , Issue.10 , pp. 1617-1628
    • Chae, S.H.1    Choi, W.2    Lee, J.H.3    Quek, T.Q.S.4
  • 33
    • 85032751776 scopus 로고    scopus 로고
    • Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches
    • Hong, Y.-W.P., Lan, P.-C., Kuo, C.-C.J., Enhancing physical-layer secrecy in multiantenna wireless systems: An overview of signal processing approaches. IEEE Signal Process. Mag. 30:5 (2013), 29–40.
    • (2013) IEEE Signal Process. Mag. , vol.30 , Issue.5 , pp. 29-40
    • Hong, Y.-W.P.1    Lan, P.-C.2    Kuo, C.-C.J.3
  • 35
    • 48049094399 scopus 로고    scopus 로고
    • Detecting and localizing wireless spoofing attacks
    • 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2017
    • Y. Chen, W. Trappe, R.P. Martin, Detecting and localizing wireless spoofing attacks, in: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2017, pp. 193–202.
    • (2007) , pp. 193-202
    • Chen, Y.1    Trappe, W.2    Martin, R.P.3
  • 42
    • 85001907801 scopus 로고    scopus 로고
    • Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks
    • SCN-16-0443.R1
    • Ahmed, F., Ko, Y.-B., Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks. Secur. Commun. Netw. 9:18 (2016), 5143–5154 SCN-16-0443.R1.
    • (2016) Secur. Commun. Netw. , vol.9 , Issue.18 , pp. 5143-5154
    • Ahmed, F.1    Ko, Y.-B.2
  • 43
    • 85042025030 scopus 로고    scopus 로고
    • Circumventing sinkholes and wormholes in wireless sensor networks
    • International Workshop on Wireless Ad-Hoc Networks.
    • A.A. Pirzada, C. McDonald, Circumventing sinkholes and wormholes in wireless sensor networks, in: International Workshop on Wireless Ad-Hoc Networks, 2005.
    • (2005)
    • Pirzada, A.A.1    McDonald, C.2
  • 44
    • 84899740998 scopus 로고    scopus 로고
    • Visualisation of wormholes in underwater sensor networks: A distributed approach
    • Wang, W., Kong, J., Bhargava, B., Gerla, M., Visualisation of wormholes in underwater sensor networks: A distributed approach. Int. J. Secur. Netw. 3:1 (2008), 10–23.
    • (2008) Int. J. Secur. Netw. , vol.3 , Issue.1 , pp. 10-23
    • Wang, W.1    Kong, J.2    Bhargava, B.3    Gerla, M.4
  • 45
    • 84991666120 scopus 로고    scopus 로고
    • Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
    • Wazid, M., Das, A.K., Kumari, S., Khan, M.K., Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Sec. Commun. Netw. 9:17 (2016), 4596–4614, 10.1002/sec.1652.
    • (2016) Sec. Commun. Netw. , vol.9 , Issue.17 , pp. 4596-4614
    • Wazid, M.1    Das, A.K.2    Kumari, S.3    Khan, M.K.4
  • 46
    • 84908454906 scopus 로고    scopus 로고
    • Sybil attacks and their defenses in the internet of things
    • Zhang, K., Liang, X., Lu, R., Shen, X., Sybil attacks and their defenses in the internet of things. IEEE Internet Things J. 1:5 (2014), 372–383, 10.1109/JIOT.2014.2344013.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.5 , pp. 372-383
    • Zhang, K.1    Liang, X.2    Lu, R.3    Shen, X.4
  • 47
    • 84947274737 scopus 로고    scopus 로고
    • Social turing tests: Crowdsourcing sybil detection
    • Symposium on Network and Distributed System Security, NDSS.
    • G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. Metzger, H. Zheng, B.Y. Zhao, Social turing tests: Crowdsourcing sybil detection, in: Symposium on Network and Distributed System Security, NDSS, 2013.
    • (2013)
    • Wang, G.1    Mohanlal, M.2    Wilson, C.3    Wang, X.4    Metzger, M.5    Zheng, H.6    Zhao, B.Y.7
  • 48
    • 84911987280 scopus 로고    scopus 로고
    • Network-layer security for the Internet of Things using TinyOS and BLIP
    • Granjal, J., Monteiro, E., Silva, J.S., Network-layer security for the Internet of Things using TinyOS and BLIP. Int. J. Commun. Syst. 27:10 (2014), 1938–1963, 10.1002/dac.2444.
    • (2014) Int. J. Commun. Syst. , vol.27 , Issue.10 , pp. 1938-1963
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 51
    • 85002424663 scopus 로고    scopus 로고
    • Identity authentication and capability based access control (iacac) for the internet of things
    • Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R., Identity authentication and capability based access control (iacac) for the internet of things. J. Cyber Secur. Mobility 1:4 (2013), 309–348.
    • (2013) J. Cyber Secur. Mobility , vol.1 , Issue.4 , pp. 309-348
    • Mahalle, P.N.1    Anggorojati, B.2    Prasad, N.R.3    Prasad, R.4
  • 52
    • 85002424663 scopus 로고    scopus 로고
    • Identity authentication and capability based access control (IACAC) for the Internet of Things
    • Sinthan, D.U., Balamurugan, M.-S., Identity authentication and capability based access control (IACAC) for the Internet of Things. J. Cyber Secur. Mob. 1:4 (2013), 309–348.
    • (2013) J. Cyber Secur. Mob. , vol.1 , Issue.4 , pp. 309-348
    • Sinthan, D.U.1    Balamurugan, M.-S.2
  • 53
    • 84867699061 scopus 로고    scopus 로고
    • Security for practical CoAP applications: Issues and solution approaches
    • 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN 2011).
    • M. Brachmann, O. Garcia-Morchon, M. Kirsche, Security for practical CoAP applications: Issues and solution approaches, in: 10th GI/ITG KuVS Fachgespraech Sensornetze (FGSN 2011), 2011.
    • (2011)
    • Brachmann, M.1    Garcia-Morchon, O.2    Kirsche, M.3
  • 54
    • 84890847807 scopus 로고    scopus 로고
    • End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ecc public-key authentication
    • IFIP Networking Conference, 2013
    • J. Granjal, E. Monteiro, J.S. Silva, End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ecc public-key authentication, in: 2013 IFIP Networking Conference, 2013, pp. 1–9.
    • (2013) , pp. 1-9
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 56
    • 85042019063 scopus 로고    scopus 로고
    • Ev2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security, in: Proceedings of the IETF Workshop on Smart Object Security
    • S. Raza, T. Voigt, V. Jutvik, Lightweight IKEv2: a key management solution for both the compressed IPsec and the IEEE 802.15. 4 security, in: Proceedings of the IETF Workshop on Smart Object Security, vol. 23, 2012.
    • (2012) , vol.23
    • Raza, S.1    Voigt, T.2    Jutvik, V.3    Lightweight, I.K.4
  • 57
    • 84952054527 scopus 로고    scopus 로고
    • Mutual authentication scheme in secure internet of things technology for comfortable lifestyle
    • 20–20
    • Park, N., Kang, N., Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors, 6(1), 2016 20–20.
    • (2016) Sensors , vol.6 , Issue.1
    • Park, N.1    Kang, N.2
  • 58
    • 84991768903 scopus 로고    scopus 로고
    • Octopus: An edge-fog mutual authentication scheme
    • Ibrahim, M.H., Octopus: An edge-fog mutual authentication scheme. Internat. J. Netw. Secur. 18:6 (2016), 1089–1101.
    • (2016) Internat. J. Netw. Secur. , vol.18 , Issue.6 , pp. 1089-1101
    • Ibrahim, M.H.1
  • 59
    • 85032350664 scopus 로고    scopus 로고
    • Distributed configuration, authorization and management in the cloud-based internet of things
    • Henze, M., Wolters, B., Matzutt, R., Zimmermann, T., Wehrle, K., Distributed configuration, authorization and management in the cloud-based internet of things. 2017 IEEE Trustcom/BigDataSE/ICESS, 2017, 185–192, 10.1109/Trustcom/BigDataSE/ICESS.2017.236.
    • (2017) 2017 IEEE Trustcom/BigDataSE/ICESS , pp. 185-192
    • Henze, M.1    Wolters, B.2    Matzutt, R.3    Zimmermann, T.4    Wehrle, K.5
  • 61
    • 84883437259 scopus 로고    scopus 로고
    • Application-layer security for the WoT: extending CoAP to support end-to-end message security for internet-integrated sensing applications
    • Springer Berlin Heidelberg
    • Granjal, J., Monteiro, E., Silva, J.S., Application-layer security for the WoT: extending CoAP to support end-to-end message security for internet-integrated sensing applications. International Conference on Wired/Wireless Internet Communication, 2013, Springer Berlin Heidelberg, 140–153.
    • (2013) International Conference on Wired/Wireless Internet Communication , pp. 140-153
    • Granjal, J.1    Monteiro, E.2    Silva, J.S.3
  • 64
    • 84899656447 scopus 로고    scopus 로고
    • Efficient naming, addressing and profile services in Internet-of-Things sensory environments
    • Liu, C.H., Yang, B., Liu, T., Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw. 18:Suppl. C (2014), 85–101, 10.1016/j.adhoc.2013.02.008.
    • (2014) Ad Hoc Netw. , vol.18 , pp. 85-101
    • Liu, C.H.1    Yang, B.2    Liu, T.3
  • 65
    • 84857915658 scopus 로고    scopus 로고
    • Overcoming adversaries in sensor networks: A survey of theoretical models and algorithmic approaches for tolerating malicious interference
    • Young, M., Boutaba, R., Overcoming adversaries in sensor networks: A survey of theoretical models and algorithmic approaches for tolerating malicious interference. IEEE Commun. Surv. Tutor. 13:4 (2011), 617–641, 10.1109/SURV.2011.041311.00156.
    • (2011) IEEE Commun. Surv. Tutor. , vol.13 , Issue.4 , pp. 617-641
    • Young, M.1    Boutaba, R.2
  • 67
    • 84981187904 scopus 로고    scopus 로고
    • The role of physical layer security in IoT: A novel perspective
    • Pecorella, T., Brilli, L., Muchhi, L., The role of physical layer security in IoT: A novel perspective. Information, 7(3), 2016.
    • (2016) Information , vol.7 , Issue.3
    • Pecorella, T.1    Brilli, L.2    Muchhi, L.3
  • 69
    • 39049085785 scopus 로고    scopus 로고
    • Light-weight detection of spoofing attacks in wireless networks
    • IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2006
    • Q. Li, W. Trappe, Light-weight detection of spoofing attacks in wireless networks, in: 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2006, pp. 845–851.
    • (2006) , pp. 845-851
    • Li, Q.1    Trappe, W.2
  • 71
    • 85018313683 scopus 로고    scopus 로고
    • Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications
    • ACM New York, NY, USA
    • Harkanson, R., Kim, Y., Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications. Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC ’17, 2017, ACM, New York, NY, USA, 6:1–6:7, 10.1145/3064814.3064818.
    • (2017) Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC ’17 , pp. 61-67
    • Harkanson, R.1    Kim, Y.2
  • 72
    • 85042000338 scopus 로고    scopus 로고
    • - US Secure Hash Algorithm 1 (SHA1). URL, 3174
    • D. Eastlake, P.E. Jones, RFC 3174 - US Secure Hash Algorithm 1 (SHA1), 2001. URL https://tools.ietf.org/html/rfc3174.
    • (2001)
    • Eastlake, D.1    Jones, P.E.2    RFC3
  • 73
    • 85042018633 scopus 로고    scopus 로고
    • HMAC: keyed-hashing for message authentication. URL
    • H. Krawczyk, M. Bellare, R. Canetti, HMAC: keyed-hashing for message authentication, 1997. URL https://tools.ietf.org/rfc/rfc2104.txt.
    • (1997)
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 74
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21:2 (1978), 120–126, 10.1145/359340.359342.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 75
    • 84883406171 scopus 로고    scopus 로고
    • The impact of rank attack on network topology of routing protocol for low-power and lossy networks
    • Le, A., Loo, J., Lasebae, A., Vinel, A., Chen, Y., Chai, M., The impact of rank attack on network topology of routing protocol for low-power and lossy networks. IEEE Sens. J. 13:10 (2013), 3685–3692, 10.1109/JSEN.2013.2266399.
    • (2013) IEEE Sens. J. , vol.13 , Issue.10 , pp. 3685-3692
    • Le, A.1    Loo, J.2    Lasebae, A.3    Vinel, A.4    Chen, Y.5    Chai, M.6
  • 76
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Hu, Y.-C., Perrig, A., Johnson, D.B., Ariadne: A secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11:1 (2005), 21–38.
    • (2005) Wirel. Netw. , vol.11 , Issue.1 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 80
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • Poovendran, R., Lazos, L., A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Netw. 13:1 (2007), 27–59, 10.1007/s11276-006-3723-x.
    • (2007) Wirel. Netw. , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 82
    • 77951114599 scopus 로고    scopus 로고
    • Detecting Sinkhole attacks in wireless sensor networks
    • ICCAS-SICE, 2009
    • C. Tumrongwittayapak, R. Varakulsiripunth, Detecting Sinkhole attacks in wireless sensor networks, in: 2009 ICCAS-SICE, 2009, pp. 1966–1971.
    • (2009) , pp. 1966-1971
    • Tumrongwittayapak, C.1    Varakulsiripunth, R.2
  • 85
    • 33750285481 scopus 로고    scopus 로고
    • SybilGuard: defending against sybil attacks via social networks
    • Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A., SybilGuard: defending against sybil attacks via social networks. SIGCOMM Comput. Commun. Rev. 36:4 (2006), 267–278, 10.1145/1151659.1159945.
    • (2006) SIGCOMM Comput. Commun. Rev. , vol.36 , Issue.4 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 88
    • 79960871268 scopus 로고    scopus 로고
    • Keep your friends close: incorporating trust into social network-based sybil defenses
    • Mohaisen, A., Hopper, N., Kim, Y., Keep your friends close: incorporating trust into social network-based sybil defenses. 2011 Proceedings IEEE INFOCOM, 2011, 1943–1951, 10.1109/INFCOM.2011.5934998.
    • (2011) 2011 Proceedings IEEE INFOCOM , pp. 1943-1951
    • Mohaisen, A.1    Hopper, N.2    Kim, Y.3
  • 89
    • 77953317298 scopus 로고    scopus 로고
    • Sybil attacks against mobile users: Friends and foes to the rescue
    • IEEE Press Piscataway, NJ, USA URL
    • Quercia, D., Hailes, S., Sybil attacks against mobile users: Friends and foes to the rescue. Proceedings of the 29th Conference on Information Communications, INFOCOM'10, 2010, IEEE Press, Piscataway, NJ, USA, 336–340 URL http://dl.acm.org/citation.cfm?id=1833515.1833583.
    • (2010) Proceedings of the 29th Conference on Information Communications, INFOCOM'10 , pp. 336-340
    • Quercia, D.1    Hailes, S.2
  • 90
    • 85042049215 scopus 로고    scopus 로고
    • - ip authentication header. URL, 4302
    • S. Kent, RFC 4302 - ip authentication header, 2005. URL https://tools.ietf.org/html/rfc4302.
    • (2005)
    • Kent, S.1    RFC2
  • 91
    • 85042031389 scopus 로고    scopus 로고
    • - IP Encapsulating Security Payload (ESP). URL, 4303
    • S. Kent, RFC 4303 - IP Encapsulating Security Payload (ESP), 2005. URL https://tools.ietf.org/html/rfc4303.
    • (2005)
    • Kent, S.1    RFC2
  • 93
    • 84911865485 scopus 로고    scopus 로고
    • Secure communication for the Internet of Things–a comparison of link-layer security and IPsec for 6LoWPAN
    • Raza, S., Duquennoy, S., Hglund, J., Roedig, U., Voigt, T., Secure communication for the Internet of Things–a comparison of link-layer security and IPsec for 6LoWPAN. Secur. Commun. Netw. 7:12 (2014), 2654–2668, 10.1002/sec.406.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.12 , pp. 2654-2668
    • Raza, S.1    Duquennoy, S.2    Hglund, J.3    Roedig, U.4    Voigt, T.5
  • 94
    • 85042049894 scopus 로고    scopus 로고
    • Compression Format for IPv6 Datagrams in 6LoWPAN Networks draft-ietf-6lowpan-hc-13. URL
    • J.W. Hui, P. Thubert, Compression Format for IPv6 Datagrams in 6LoWPAN Networks draft-ietf-6lowpan-hc-13, 2010. URL https://tools.ietf.org/html/draft-ietf-6lowpan-hc-13.
    • (2010)
    • Hui, J.W.1    Thubert, P.2
  • 95
    • 85042032122 scopus 로고    scopus 로고
    • Transmission of IPv6 Packets over IEEE 802.15.4 Networks. URL
    • G. Montenegro, N. Kushalnagar, J.W. Hui, D.E. Culler, Transmission of IPv6 Packets over IEEE 802.15.4 Networks, 2007. URL https://tools.ietf.org/html/rfc4944.
    • (2007)
    • Montenegro, G.1    Kushalnagar, N.2    Hui, J.W.3    Culler, D.E.4
  • 97
    • 84885304488 scopus 로고    scopus 로고
    • {DTLS} based security and two-way authentication for the Internet of Things
    • Kothmayr, T., Schmitt, C., Hu, W., Brnig, M., Carle, G., {DTLS} based security and two-way authentication for the Internet of Things. Ad Hoc Netw. 11:8 (2013), 2710–2723, 10.1016/j.adhoc.2013.05.003.
    • (2013) Ad Hoc Netw. , vol.11 , Issue.8 , pp. 2710-2723
    • Kothmayr, T.1    Schmitt, C.2    Hu, W.3    Brnig, M.4    Carle, G.5
  • 99
    • 84910634929 scopus 로고    scopus 로고
    • Robust multi-factor authentication for fragile communications
    • Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11:6 (2014), 568–581, 10.1109/TDSC.2013.2297110.
    • (2014) IEEE Trans. Dependable Secure Comput. , vol.11 , Issue.6 , pp. 568-581
    • Huang, X.1    Xiang, Y.2    Bertino, E.3    Zhou, J.4    Xu, L.5
  • 101
    • 84928596525 scopus 로고    scopus 로고
    • An overview of fog computing and its security issues
    • Stojmenovic, I., Wen, S., Huang, X., Luan, H., An overview of fog computing and its security issues. Concurr. Comput. Pract. Exp. 28:10 (2016), 2991–3005, 10.1002/cpe.3485.
    • (2016) Concurr. Comput. Pract. Exp. , vol.28 , Issue.10 , pp. 2991-3005
    • Stojmenovic, I.1    Wen, S.2    Huang, X.3    Luan, H.4
  • 105
    • 85042052002 scopus 로고    scopus 로고
    • BUTLER-Consortium, BUTLER smartlife –uBiquitous, secUre inTernet-of-things with Location and contExt-awaReness. URL
    • BUTLER-Consortium, BUTLER smartlife –uBiquitous, secUre inTernet-of-things with Location and contExt-awaReness, 2014. URL http://cordis.europa.eu/docs/projects/cnect/1/287901/080/deliverables/001-287901BUTLERD25.pdf.
    • (2014)
  • 109
    • 84889100209 scopus 로고    scopus 로고
    • Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications
    • Gmez-Goiri, A., Ordua, P., Diego, J., de Ipiña, D.L., Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications. Comput. Hum. Behav. 30:Suppl. C (2014), 460–467, 10.1016/j.chb.2013.06.022.
    • (2014) Comput. Hum. Behav. , vol.30 , pp. 460-467
    • Gmez-Goiri, A.1    Ordua, P.2    Diego, J.3    de Ipiña, D.L.4
  • 110
    • 85042004642 scopus 로고    scopus 로고
    • OneM2M, Security solutions –OneM2M Technical Specification. URL
    • OneM2M, Security solutions –OneM2M Technical Specification, 2017. URL http://onem2m.org/technical/latest-drafts.
    • (2017)
  • 113
    • 85042006305 scopus 로고    scopus 로고
    • The-Bitcoin-Foundation, How does Bitcoin work?. URL
    • The-Bitcoin-Foundation, How does Bitcoin work?, 2014. URL https://bitcoin.org/en/how-it-works.
    • (2014)
  • 114
    • 85042060416 scopus 로고    scopus 로고
    • BitInfoCharts, Block - Bitcoin Wiki. URL
    • BitInfoCharts, Block - Bitcoin Wiki, 2016. URL https://en.bitcoin.it/wiki/Block.
    • (2016)
  • 115
    • 85042057117 scopus 로고    scopus 로고
    • EtherScan, Ethereum Average BlockTime Chart. URL
    • EtherScan, Ethereum Average BlockTime Chart, 2016. URL https://etherscan.io/chart/blocktime.
    • (2016)
  • 116
    • 85042025993 scopus 로고    scopus 로고
    • Linux-Foundation, Blockchain technologies for business. URL
    • Linux-Foundation, Blockchain technologies for business, 2017. URL https://www.hyperledger.org/.
    • (2017)
  • 117
    • 85042015799 scopus 로고    scopus 로고
    • What is eris? 2016 Edition. URL
    • C. Kuhlman, What is eris? 2016 Edition, 2016. URL https://monax.io/2016/04/03/wtf-is-eris/.
    • (2016)
    • Kuhlman, C.1
  • 118
    • 85042039416 scopus 로고    scopus 로고
    • Stellar, Stellar network overview. URL
    • Stellar, Stellar network overview, 2014. URL https://www.stellar.org/developers/guides/get-started/.
    • (2014)
  • 119
    • 85042052918 scopus 로고    scopus 로고
    • Ripple, Ripple network. URL
    • Ripple, Ripple network, 2013. URL https://ripple.com/network.
    • (2013)
  • 120
    • 85042056631 scopus 로고    scopus 로고
    • All-In-Bits, Introduction to tendermint. URL
    • All-In-Bits, Introduction to tendermint, 2017. URL https://tendermint.com/intro.
    • (2017)
  • 121
    • 85031688484 scopus 로고    scopus 로고
    • The blockchain phenomenon: The disruptive potential of distributed consensu architectures
    • Research Institute of the Finnish Economy URL
    • Mattila, J., The blockchain phenomenon: The disruptive potential of distributed consensu architectures. ETLA working papers: Elinkeinoelämän Tutkimuslaitos, 2016, Research Institute of the Finnish Economy URL https://books.google.com.pk/books?id=StNQnQAACAAJ.
    • (2016) ETLA working papers: Elinkeinoelämän Tutkimuslaitos
    • Mattila, J.1
  • 122
    • 85042034441 scopus 로고    scopus 로고
    • EconoTimes, Safeshare releases first blockchain insurance solution for sharing economy. URL
    • EconoTimes, Safeshare releases first blockchain insurance solution for sharing economy, 2016. URL https://www.econotimes.com/SafeShare-Releases-First-Blockchain-Insurance-Solution-For-Sharing-Economy-181326.
    • (2016)
  • 123
    • 85042045405 scopus 로고    scopus 로고
    • IBM blockchain based on hyperledger fabric from the linux foundation. URL
    • IBM, IBM blockchain based on hyperledger fabric from the linux foundation, 2017. URL https://www.ibm.com/blockchain/hyperledger.html.
    • (2017)
    • IBM1
  • 124
    • 84900465745 scopus 로고    scopus 로고
    • Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative
    • Friese, I., Heuer, J., Kong, N., Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative. 2014 IEEE World Forum on Internet of Things (WF-IoT), 2014, 1–4, 10.1109/WF-IoT.2014.6803106.
    • (2014) 2014 IEEE World Forum on Internet of Things (WF-IoT) , pp. 1-4
    • Friese, I.1    Heuer, J.2    Kong, N.3
  • 126
    • 85029375018 scopus 로고    scopus 로고
    • Blockchain for the Internet of Things: A systematic literature Review
    • The 3rd International Symposium on Internet of Things: Systems, Management, and Security, IOTSMS-2016.
    • M. Conoscenti, A. Vetro, J.C.D. Martin, Blockchain for the Internet of Things: A systematic literature Review, in: The 3rd International Symposium on Internet of Things: Systems, Management, and Security, IOTSMS-2016, 2016.
    • (2016)
    • Conoscenti, M.1    Vetro, A.2    Martin, J.C.D.3
  • 127
    • 85042022047 scopus 로고    scopus 로고
    • Enigma: decentralized computation platform with guaranteed privacy. URL
    • G. Zyskind, O. Nathan, A. Pentland, Enigma: decentralized computation platform with guaranteed privacy, 2015. URL http://enigma.media.mit.edu/enigma~full.pdf.
    • (2015)
    • Zyskind, G.1    Nathan, O.2    Pentland, A.3
  • 130
    • 85042020138 scopus 로고    scopus 로고
    • Privacy-awareness in Blockchain-based PKI, Tech. Rep. 2015. URL
    • L. Axon, Privacy-awareness in Blockchain-based PKI, Tech. Rep. 2015. URL https://ora.ox.ac.uk/objects/uuid:f8377b69-599b-4cae-8df0-f0cded53e63b/datastreams/ATTACHMENT01.
    • Axon, L.1
  • 131
    • 85042054706 scopus 로고    scopus 로고
    • CertCoin: A namecoin based decentralized authentication system. URL
    • C. Fromknecht, D. Velicanu, S. Yakoubov, CertCoin: A namecoin based decentralized authentication system, 2014. URL https://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf.
    • (2014)
    • Fromknecht, C.1    Velicanu, D.2    Yakoubov, S.3
  • 132
    • 85042051360 scopus 로고    scopus 로고
    • Blockchain platform for industrial Internet of Things, Tech. Rep. 2016. URL
    • A. Bahga, V.K. Madisetti, Blockchain platform for industrial Internet of Things, Tech. Rep. 2016. URL http://file.scirp.org/pdf/JSEA_2016102814012798.pdf.
    • Bahga, A.1    Madisetti, V.K.2
  • 133
    • 84979828304 scopus 로고    scopus 로고
    • Blockchains and smart contracts for the Internet of Things
    • Christidis, K., Devetsikiotis, M., Blockchains and smart contracts for the Internet of Things. IEEE Access 4 (2016), 2292–2303, 10.1109/ACCESS.2016.2566339.
    • (2016) IEEE Access , vol.4 , pp. 2292-2303
    • Christidis, K.1    Devetsikiotis, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.