메뉴 건너뛰기




Volumn 2017-October, Issue , 2017, Pages 1-7

Lightweight security protocols for the Internet of Things

Author keywords

Authentication; Encryption; Integrity; Internet of Things; Key management; Lightweight security protocols

Indexed keywords

COMPUTATIONAL EFFICIENCY; CRYPTOGRAPHY; EMBEDDED SYSTEMS; INFORMATION MANAGEMENT; INFORMATION THEORY; INTERNET OF THINGS; INTERNET PROTOCOLS; NETWORK LAYERS; NETWORK SECURITY;

EID: 85045244704     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIMRC.2017.8292779     Document Type: Conference Paper
Times cited : (20)

References (20)
  • 1
    • 84976520905 scopus 로고    scopus 로고
    • Performance evaluation of block ciphers for wireless sensor networks
    • (Eds: R. Choudhary, et al), Springer, Singapore
    • K. Biswas, V. Muthukkumarasamy, X.-W. Wu, and K. Singh, "Performance Evaluation of Block Ciphers for Wireless Sensor Networks," in: Advanced Computing and Communication Technologies, (Eds: R. Choudhary, et al), Springer, Singapore, 2016, pp. 443-452.
    • (2016) Advanced Computing and Communication Technologies , pp. 443-452
    • Biswas, K.1    Muthukkumarasamy, V.2    Wu, X.-W.3    Singh, K.4
  • 2
    • 85015170558 scopus 로고    scopus 로고
    • S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol
    • D. Chen, N. Zhang, Z. Qin, X. Mao, Z. Qin, X. Shen, and X. Li, "S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol," IEEE Internet of Things Journal, 4, No. 1, pp. 88-100, 2017.
    • (2017) IEEE Internet of Things Journal , vol.4 , Issue.1 , pp. 88-100
    • Chen, D.1    Zhang, N.2    Qin, Z.3    Mao, X.4    Qin, Z.5    Shen, X.6    Li, X.7
  • 5
    • 85039783799 scopus 로고    scopus 로고
    • Lightweight mutual authentication for IoT and its applications
    • N. Li, D. Liu, and S. Nepal, "Lightweight Mutual Authentication for IoT and Its Applications," IEEE Transactions on Sustainable Computing, 14, No. 8, 2017.
    • (2017) IEEE Transactions on Sustainable Computing , vol.14 , Issue.8
    • Li, N.1    Liu, D.2    Nepal, S.3
  • 6
    • 85022194478 scopus 로고    scopus 로고
    • A security framework for the internet of things in the future internet architecture
    • X. Liu, M. Zhao, S. Li, F. Zhang, and W. Trappe, "A Security Framework for the Internet of Things in the Future Internet Architecture," Future Internet, 9, No. 27, 2017.
    • (2017) Future Internet , vol.9 , Issue.27
    • Liu, X.1    Zhao, M.2    Li, S.3    Zhang, F.4    Trappe, W.5
  • 7
    • 84973441945 scopus 로고    scopus 로고
    • A survey of key management schemes in multi-phase wireless sensor network
    • M. Messai and H. Seba, "A survey of key management schemes in multi-phase wireless sensor network," Computer Networks, 105, 2016, pp. 60-74.
    • (2016) Computer Networks , vol.105 , pp. 60-74
    • Messai, M.1    Seba, H.2
  • 8
    • 84893115938 scopus 로고    scopus 로고
    • Hardware security for device authentication in smart grid
    • (eds: J. Cuellar), Lecture Notes in Computer Science (LNCS) Springer, Berlin, Heidelberg
    • A. J. Paverd, and A.P. Martin, "Hardware Security for Device Authentication in Smart Grid," In Proceedings of 2012 International Workshop on Smart Grid Security, (eds: J. Cuellar), Lecture Notes in Computer Science (LNCS), Vol 7823. Springer, Berlin, Heidelberg, pp. 72-84, 2013.
    • (2013) Proceedings of 2012 International Workshop on Smart Grid Security , vol.7823 , pp. 72-84
    • Paverd, A.J.1    Martin, A.P.2
  • 9
    • 85045232507 scopus 로고    scopus 로고
    • Security challenges for the internet of things
    • T. Polk, and S. Turner, "Security Challenges for the Internet of Things," IETF Security, 2011.
    • (2011) IETF Security
    • Polk, T.1    Turner, S.2
  • 10
    • 84855203308 scopus 로고    scopus 로고
    • Computational and energy costs of cryptographic algorithms on handheld devices
    • H. Rifà-Pous and J. Herrera-Joancomartí, "Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices," Future Internet, 3, 2011, pp. 31-48.
    • (2011) Future Internet , vol.3 , pp. 31-48
    • Rifà-Pous, H.1    Herrera-Joancomartí, J.2
  • 11
    • 84922933943 scopus 로고    scopus 로고
    • Low-energy security: Limits and opportunities in the internet of things
    • W. Trappe, R. Howard, and R.S. Moore, "Low-Energy Security: Limits and Opportunities in the Internet of Things," IEEE Security & Privacy, 13, no. 1, 2015, pp. 14-21.
    • (2015) IEEE Security & Privacy , vol.13 , Issue.1 , pp. 14-21
    • Trappe, W.1    Howard, R.2    Moore, R.S.3
  • 12
    • 84961073768 scopus 로고    scopus 로고
    • Green internet of things for smart world
    • C. Zhu, V.C.M. Leung, L. Shu, and E. C.-H. Ngai, "Green Internet of Things for Smart World," IEEE Access, 3, 2015, pp. 2151-2162.
    • (2015) IEEE Access , vol.3 , pp. 2151-2162
    • Zhu, C.1    Leung, V.C.M.2    Shu, L.3    Ngai, E.C.-H.4
  • 13
    • 84984677345 scopus 로고    scopus 로고
    • Intelligent device-to-device communication in the internet of things
    • O. Bello, and S. Zeadally, "Intelligent Device-to-Device Communication in the Internet of Things," IEEE Systems Journal, 10, no. 3, pp. 1172-1182, 2016.
    • (2016) IEEE Systems Journal , vol.10 , Issue.3 , pp. 1172-1182
    • Bello, O.1    Zeadally, S.2
  • 14
    • 0003470642 scopus 로고    scopus 로고
    • Security architecture for the internet protocol
    • December
    • S. Kent and K. Seo, "Security Architecture for the Internet Protocol," RFC 4301, December 2005.
    • (2005) RFC 4301
    • Kent, S.1    Seo, K.2
  • 16
    • 85172564787 scopus 로고    scopus 로고
    • Information-theoretically secure key management
    • submitted to
    • E.-H. Yang and X.-W. Wu, "Information-Theoretically Secure Key Management," submitted to Journal of Cryptology, 2017.
    • (2017) Journal of Cryptology
    • Yang, E.-H.1    Wu, X.-W.2
  • 17
    • 33746646599 scopus 로고    scopus 로고
    • Internet key exchange (IKEv2) protocol
    • December
    • C. Kaufman, "Internet Key Exchange (IKEv2) Protocol," RFC 4306, December 2005.
    • (2005) RFC 4306
    • Kaufman, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.