메뉴 건너뛰기




Volumn 502, Issue , 2019, Pages 183-187

Implementation of security mechanism in IIoT systems

Author keywords

Cloud Fog computing; Diffie Hellman key generation exchange method; Industrial Internet of Things (IIoT); Lightweight Encryption Algorithm (LEA); Message authentication tag; Network security

Indexed keywords

CRYPTOGRAPHY; FACTORY AUTOMATION; FOG; FOG COMPUTING; INFORMATION SERVICES; INTELLIGENT COMPUTING; INTERNET OF THINGS;

EID: 85049561619     PISSN: 18761100     EISSN: 18761119     Source Type: Book Series    
DOI: 10.1007/978-981-13-0311-1_30     Document Type: Conference Paper
Times cited : (4)

References (10)
  • 1
    • 78649302229 scopus 로고    scopus 로고
    • Cloud computing: State-of-the-art and research challenges
    • Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. J. Internet Serv. Appl. 1(1), 7–18 (2010)
    • (2010) J. Internet Serv. Appl. , vol.1 , Issue.1 , pp. 7-18
    • Zhang, Q.1    Cheng, L.2    Boutaba, R.3
  • 2
    • 84976266081 scopus 로고    scopus 로고
    • State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing
    • Diaz, M., Martin, C., Rubio, B.: State-of-the-art, challenges, and open issues in the integration of internet of things and cloud computing. J. Netw. Comput. Appl. 67, 99–117 (2016)
    • (2016) J. Netw. Comput. Appl. , vol.67 , pp. 99-117
    • Diaz, M.1    Martin, C.2    Rubio, B.3
  • 4
    • 85049599864 scopus 로고    scopus 로고
    • A study on the security framework for IoT services based on cloud and fog computing
    • Shin, M., Kim, S.: A study on the security framework for IoT services based on cloud and fog computing. J. Korea Multimed. Soc. 20(12), 101–112 (2017)
    • (2017) J. Korea Multimed. Soc. , vol.20 , Issue.12 , pp. 101-112
    • Shin, M.1    Kim, S.2
  • 6
    • 85049553872 scopus 로고    scopus 로고
    • Security issues and challenges in cloud computing
    • Sarkar, S., Bharadwaj, V.K., Priya, G.: Security issues and challenges in cloud computing. Int. Res. J. Eng. Technol. 3(10), 1143–1146 (2016)
    • (2016) Int. Res. J. Eng. Technol. , vol.3 , Issue.10 , pp. 1143-1146
    • Sarkar, S.1    Bharadwaj, V.K.2    Priya, G.3
  • 7
    • 84914110992 scopus 로고    scopus 로고
    • Secure user data in cloud computing using encryption algorithms
    • Arora, R., Parashar, A.: Secure user data in cloud computing using encryption algorithms. Int. J. Eng. Res. Appl. 3(4), 1922–1926 (2013)
    • (2013) Int. J. Eng. Res. Appl. , vol.3 , Issue.4 , pp. 1922-1926
    • Arora, R.1    Parashar, A.2
  • 8
    • 84963899197 scopus 로고    scopus 로고
    • 128bit block cipher LEA
    • Park, J.: 128bit block cipher LEA. TTA J. 157, 64–69 (2015)
    • (2015) TTA J , vol.157 , pp. 64-69
    • Park, J.1
  • 9
    • 0012983374 scopus 로고    scopus 로고
    • Recommendation for block cipher modes of operation. Methods and techniques (No. NIST-SP-800-38A)
    • Dworkin, M.: Recommendation for block cipher modes of operation. Methods and techniques (No. NIST-SP-800-38A). National Institute of Standards and Technology (2001)
    • (2001) National Institute of Standards and Technology
    • Dworkin, M.1
  • 10
    • 0242674155 scopus 로고    scopus 로고
    • Diffie-Hellman Key Agreement Method
    • Rescorla, E.: Diffie-Hellman Key Agreement Method. IETF RFC2631 (1999)
    • (1999) IETF RFC2631
    • Rescorla, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.