메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 26743-26753

Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in Infrastructureless Peer-Aware Communications

Author keywords

infrastructureless peer aware communication; lightweight device; Multi security level; social networking

Indexed keywords

AUTHENTICATION; INTERNET OF THINGS; NAVIGATION; NETWORK PROTOCOLS; PICTURE ARCHIVING AND COMMUNICATION SYSTEMS; SOCIAL NETWORKING (ONLINE);

EID: 85035786996     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2777443     Document Type: Article
Times cited : (29)

References (42)
  • 1
    • 84904393871 scopus 로고    scopus 로고
    • Survey on mobile social net-working in proximity (MSNP): Approaches, challenges and architecture
    • Aug.
    • Y.Wang, A. V. Vasilakos, Q. Jin, and J. Ma, "Survey on mobile social net-working in proximity (MSNP): Approaches, challenges and architecture," Wireless Netw., vol. 20, no. 6, pp. 1295-1311, Aug. 2014.
    • (2014) Wireless Netw. , vol.20 , Issue.6 , pp. 1295-1311
    • Wang, Y.1    Vasilakos, A.V.2    Jin, Q.3    Ma, J.4
  • 2
    • 84924871754 scopus 로고    scopus 로고
    • Social on the road: Enabling secure and efficient social networking on highways
    • Feb.
    • T. H. Luan, R. Lu, X. Shen, and F. Bai, "Social on the road: Enabling secure and efficient social networking on highways," IEEE Wireless Commun., vol. 22, no. 1, pp. 44-51, Feb. 2015.
    • (2015) IEEE Wireless Commun. , vol.22 , Issue.1 , pp. 44-51
    • Luan, T.H.1    Lu, R.2    Shen, X.3    Bai, F.4
  • 3
    • 84941242313 scopus 로고    scopus 로고
    • Reliable multicasting service for densely deployed military sensor networks
    • W. Na, N.-N. Dao, and S. Cho, "Reliable multicasting service for densely deployed military sensor networks," Int. J. Distrib. Sensor Netw., vol. 11, no. 8, p. 341912, 2015.
    • (2015) Int. J. Distrib. Sensor Netw. , vol.11 , Issue.8 , pp. 341912
    • Na, W.1    Dao, N.-N.2    Cho, S.3
  • 4
    • 84963960500 scopus 로고    scopus 로고
    • Mitigating WiFi interference to improve throughput for in-vehicle infotainment networks
    • Feb.
    • W. Na, N.-N. Dao, and S. Cho, "Mitigating WiFi interference to improve throughput for in-vehicle infotainment networks," IEEE Wireless Com-mun., vol. 23, no. 1, pp. 22-28, Feb. 2016.
    • (2016) IEEE Wireless Com-mun. , vol.23 , Issue.1 , pp. 22-28
    • Na, W.1    Dao, N.-N.2    Cho, S.3
  • 5
    • 84983338560 scopus 로고    scopus 로고
    • Using social Internet of Things (SIoT) demand side management on the plant
    • Jul.
    • J. Eom et al., "Using social Internet of Things (SIoT) demand side management on the plant," in Proc. IEEE Int. Conf. Ubiquitous Future Netw. (ICUFN), Jul. 2016, pp. 685-687.
    • (2016) Proc. IEEE Int. Conf. Ubiquitous Future Netw. (ICUFN) , pp. 685-687
    • Eom, J.1
  • 6
    • 85027285834 scopus 로고    scopus 로고
    • Adaptive MCS selection and resource planning for energy-efficient communication in LTE-M based IoT sensing platform
    • N.-N. Dao, M. Park, J. Kim, and S. Cho, "Adaptive MCS selection and resource planning for energy-efficient communication in LTE-M based IoT sensing platform," PLoS ONE, vol. 12, no. 8, p. e0182527, 2017.
    • (2017) PLoS ONE , vol.12 , Issue.8 , pp. e0182527
    • Dao, N.-N.1    Park, M.2    Kim, J.3    Cho, S.4
  • 7
    • 85040160048 scopus 로고    scopus 로고
    • IEEE Standard P802.15 TG8 standardization, Doc#: 15-12-0684-00-0008
    • E. Zeira, Q. Li, and S. Jin, The PAC Application Matrix, IEEE Standard P802.15 TG8 standardization, Doc#: 15-12-0684-00-0008, 2012.
    • (2012) The PAC Application Matrix
    • Zeira, E.1    Li, Q.2    Jin, S.3
  • 8
    • 84983027871 scopus 로고    scopus 로고
    • Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks
    • N.-N. Dao, J. Kim, M. Park, and S. Cho, "Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks," PLoS ONE, vol. 11, no. 8, p. e0160375, 2016.
    • (2016) PLoS ONE , vol.11 , Issue.8 , pp. e0160375
    • Dao, N.-N.1    Kim, J.2    Park, M.3    Cho, S.4
  • 9
    • 85029601469 scopus 로고    scopus 로고
    • Adaptive resource balancing for serviceability maximization in fog radio access networks
    • N.-N. Dao et al., "Adaptive resource balancing for serviceability maximization in fog radio access networks," IEEE Access, vol. 5, pp. 14548-14559, 2017.
    • (2017) IEEE Access , vol.5 , pp. 14548-14559
    • Dao, N.-N.1
  • 10
    • 84900414638 scopus 로고    scopus 로고
    • Device-to-device communications in cellular networks
    • Apr.
    • D. Feng, L. Lu, Y. Yuan-Wu, G. Li, S. Li, and G. Feng, "Device-to-device communications in cellular networks," IEEE Commun. Mag., vol. 52, no. 4, pp. 49-55, Apr. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.4 , pp. 49-55
    • Feng, D.1    Lu, L.2    Yuan-Wu, Y.3    Li, G.4    Li, S.5    Feng, G.6
  • 11
    • 85040159940 scopus 로고    scopus 로고
    • IEEE Standard P802.15 TG8 Standardization, Doc#: 15-16-0113-01-0008
    • Official Draft of IEEE 802.15.8 PAC D0.18.0, IEEE Standard P802.15 TG8 Standardization, Doc#: 15-16-0113-01-0008, 2016.
    • (2016) Official Draft of IEEE 802.15.8 PAC D0.18.0
  • 12
    • 85040160163 scopus 로고    scopus 로고
    • Accessed: Jun. 20, [Online]
    • IEEE 802.15.8 Document Repository. Accessed: Jun. 20, 2017. [Online]. Available: https://mentor.ieee.org/802.15/documents?is-group=0008
    • (2017) IEEE 802.15.8 Document Repository
  • 14
    • 85040160413 scopus 로고    scopus 로고
    • IEEE Standard P802.15 TG8 Standardization, Doc#: 15-15-0254-00-0008
    • W. Na and S. Cho, MAC Security for IEEE 802.15.8 PAC, IEEE Standard P802.15 TG8 Standardization, Doc#: 15-15-0254-00-0008, 2015.
    • (2015) MAC Security for IEEE 802.15.8 PAC
    • Na, W.1    Cho, S.2
  • 15
    • 85040160408 scopus 로고    scopus 로고
    • IEEE Standard P802.15 TG8 Standardization, Doc#: 15-16-0696-00-0008
    • B. Kwak and N. Song, Fixed Equations for PHY Security, IEEE Standard P802.15 TG8 Standardization, Doc#: 15-16-0696-00-0008, 2016.
    • (2016) Fixed Equations for PHY Security
    • Kwak, B.1    Song, N.2
  • 16
    • 40949152760 scopus 로고    scopus 로고
    • Password authentication schemes: Current status and key issues
    • C.-S. Tsai, C.-C. Lee, and M.-S. Hwang, "Password authentication schemes: Current status and key issues," Int. J. Netw. Secur., vol. 3, no. 2, pp. 101-115, 2006.
    • (2006) Int. J. Netw. Secur. , vol.3 , Issue.2 , pp. 101-115
    • Tsai, C.-S.1    Lee, C.-C.2    Hwang, M.-S.3
  • 17
    • 84933522482 scopus 로고    scopus 로고
    • Physical layer key generation in wireless networks: Chal-lenges and opportunities
    • Jun.
    • K. Zeng, "Physical layer key generation in wireless networks: Chal-lenges and opportunities," IEEE Commun. Mag., vol. 53, no. 6, pp. 33-39, Jun. 2015.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.6 , pp. 33-39
    • Zeng, K.1
  • 18
    • 84969980315 scopus 로고    scopus 로고
    • A survey on security in D2D communications
    • Apr.
    • M. Wang and Z. Yan, "A survey on security in D2D communications," Mobile Netw. Appl., vol. 22, no. 2, pp. 195-208, Apr. 2017.
    • (2017) Mobile Netw. Appl. , vol.22 , Issue.2 , pp. 195-208
    • Wang, M.1    Yan, Z.2
  • 19
    • 84997497763 scopus 로고    scopus 로고
    • A survey on device-to-device (D2D) communication: Architecture and security issues
    • Jan.
    • P. Gandotra, R. K. Jha, and S. Jain, "A survey on device-to-device (D2D) communication: Architecture and security issues," J. Netw. Comput. Appl., vol. 78, pp. 9-26, Jan. 2017.
    • (2017) J. Netw. Comput. Appl. , vol.78 , pp. 9-26
    • Gandotra, P.1    Jha, R.K.2    Jain, S.3
  • 21
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • Oct.
    • C. C. Wu, W. B. Lee, and W.-J. Tsaur, "A secure authentication scheme with anonymity for wireless communications," IEEE Commun. Lett., vol. 12, no. 10, pp. 722-723, Oct. 2008.
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.-J.3
  • 22
    • 84868231183 scopus 로고    scopus 로고
    • Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
    • I. Butun, Y. Wang, Y.-S. Lee, and R. Sankar, "Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks," Int. J. Security Netw., vol. 7, no. 2, pp. 107-121, 2012.
    • (2012) Int. J. Security Netw. , vol.7 , Issue.2 , pp. 107-121
    • Butun, I.1    Wang, Y.2    Lee, Y.-S.3    Sankar, R.4
  • 23
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • D. He, Y. Gao, S. Chan, C. Chen, and J. Bu, "An enhanced two-factor user authentication scheme in wireless sensor networks," Ad Hoc Sensor Wireless Netw., vol. 10, no. 4, pp. 361-371, 2010.
    • (2010) Ad Hoc Sensor Wireless Netw. , vol.10 , Issue.4 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 24
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Mar.
    • M. L. Das, "Two-factor user authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 26
    • 84911875895 scopus 로고    scopus 로고
    • A survey of key distribution in wireless sensor networks
    • C.-Y. Chen and H.-C. Chao, "A survey of key distribution in wireless sensor networks," Security Commun. Netw., vol. 7, no. 12, pp. 2495-2508, 2014.
    • (2014) Security Commun. Netw. , vol.7 , Issue.12 , pp. 2495-2508
    • Chen, C.-Y.1    Chao, H.-C.2
  • 27
    • 84945429312 scopus 로고    scopus 로고
    • A survey on lightweight entity authentication with strong PUFs
    • J. Delvaux, R. Peeters, D. Gu, and I. Verbauwhede, "A survey on lightweight entity authentication with strong PUFs," ACM Comput. Surv., vol. 48, no. 2, 2015, Art. no. 26.
    • (2015) ACM Comput. Surv. , vol.48 , Issue.2
    • Delvaux, J.1    Peeters, R.2    Gu, D.3    Verbauwhede, I.4
  • 30
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 32
    • 84903511156 scopus 로고    scopus 로고
    • Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks
    • Jul.
    • W.-B. Hsieh and J.-S. Leu, "Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks," Wireless Commun. Mobile Comput., vol. 14, no. 10, pp. 995-1006, Jul. 2014.
    • (2014) Wireless Commun. Mobile Comput. , vol.14 , Issue.10 , pp. 995-1006
    • Hsieh, W.-B.1    Leu, J.-S.2
  • 33
    • 84989854376 scopus 로고    scopus 로고
    • A quantum Diffie-Hellman protocol
    • Jan.
    • P. Subramaniam and A. Parakh, "A quantum Diffie-Hellman protocol," Int. J. Secur. Netw., vol. 11, no. 4, pp. 213-223, Jan. 2016.
    • (2016) Int. J. Secur. Netw. , vol.11 , Issue.4 , pp. 213-223
    • Subramaniam, P.1    Parakh, A.2
  • 34
    • 84954137569 scopus 로고    scopus 로고
    • Imperfect forward secrecy: How Diffie-Hellman fails in practice
    • e, L. Valenta
    • D. Adrian et al., "e, L. Valenta, "Imperfect forward secrecy: How Diffie-Hellman fails in practice," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2015, pp. 5-17.
    • (2015) Proc. ACM SIGSAC Conf. Comput. Commun. Secur. , pp. 5-17
    • Adrian, D.1
  • 35
    • 0029234878 scopus 로고
    • Unconventional cryp-tographic keying variable management
    • Jan.
    • J. E. Hershey, A. A. Hassan, and R. Yarlagadda, "Unconventional cryp-tographic keying variable management," IEEE Trans. Commun., vol. 43, no. 1, pp. 3-6, Jan. 1995.
    • (1995) IEEE Trans. Commun. , vol.43 , Issue.1 , pp. 3-6
    • Hershey, J.E.1    Hassan, A.A.2    Yarlagadda, R.3
  • 36
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorre-lated bit extraction for shared secret key generation from channel mea-surements
    • Jan.
    • N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorre-lated bit extraction for shared secret key generation from channel mea-surements," IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17-30, Jan. 2010.
    • (2010) IEEE Trans. Mobile Comput. , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.K.4
  • 37
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • Mar.
    • K. Zeng, D.Wu, A. Chan, and P. Mohapatra, "Exploiting multiple-antenna diversity for shared secret key generation in wireless networks," in Proc. IEEE Conf. Inf. Commun. (INFOCOM), Mar. 2010, pp. 1837-1845.
    • (2010) Proc. IEEE Conf. Inf. Commun. (INFOCOM) , pp. 1837-1845
    • Zeng, K.1    Wu, D.2    Chan, A.3    Mohapatra, P.4
  • 38
    • 84867755583 scopus 로고    scopus 로고
    • Limitations of generating a secret key using wireless fading under active adversary
    • Oct.
    • M. Zafer, D. Agrawal, and M. Srivatsa, "Limitations of generating a secret key using wireless fading under active adversary," IEEE/ACMTrans. Netw., vol. 20, no. 5, pp. 1440-1451, Oct. 2012.
    • (2012) IEEE/ACMTrans. Netw. , vol.20 , Issue.5 , pp. 1440-1451
    • Zafer, M.1    Agrawal, D.2    Srivatsa, M.3
  • 39
    • 84941248397 scopus 로고    scopus 로고
    • Fully distributed multicast routing protocol for IEEE 802.15.8 peer-aware communication
    • W. Na, Y. Lee, J. Yoon, J. Park, and S. Cho, "Fully distributed multicast routing protocol for IEEE 802.15.8 peer-aware communication," Int. J. Distrib. Sensor Netw., vol. 11, no. 8, p. 531710, 2015.
    • (2015) Int. J. Distrib. Sensor Netw. , vol.11 , Issue.8 , pp. 531710
    • Na, W.1    Lee, Y.2    Yoon, J.3    Park, J.4    Cho, S.5
  • 40
    • 84939986391 scopus 로고    scopus 로고
    • Recommendations in location-based social networks: A survey
    • Jul.
    • J. Bao, Y. Zheng, D. Wilkie, and M. Mokbel, "Recommendations in location-based social networks: A survey," GeoInformatica, vol. 19, no. 3, pp. 525-565, Jul. 2015.
    • (2015) GeoInformatica , vol.19 , Issue.3 , pp. 525-565
    • Bao, J.1    Zheng, Y.2    Wilkie, D.3    Mokbel, M.4
  • 41
    • 84922001255 scopus 로고    scopus 로고
    • Social context-aware trust inference for trust enhancement in social network based recommendations on service providers
    • Jan.
    • Y. Wang, L. Li, and G. Liu, "Social context-aware trust inference for trust enhancement in social network based recommendations on service providers," World Wide Web, vol. 18, no. 1, pp. 159-184, Jan. 2015.
    • (2015) World Wide Web , vol.18 , Issue.1 , pp. 159-184
    • Wang, Y.1    Li, L.2    Liu, G.3
  • 42
    • 85040160364 scopus 로고    scopus 로고
    • Accessed: Jul. 23, [Online]
    • OPNET Modeler 14.5. Accessed: Jul. 23, 2017. [Online]. Available: https://www.opnet.com
    • (2017) OPNET Modeler 14.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.