Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare Applications
暂无分享,去创建一个
Wael Elmedany | Chitra Balakrishna | Sara Alromaihi | C. Balakrishna | W. Elmedany | Sara Alromaihi | Wael Elmedany
[1] Emanuele Garone,et al. False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[2] JeongGil Ko,et al. Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.
[3] John A. Stankovic,et al. Context-aware wireless sensor networks for assisted living and residential monitoring , 2008, IEEE Network.
[4] Michele Nogueira Lima,et al. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[5] Yan Rong Shi,et al. Internet of Things Key Technologies and Architectures Research in Information Processing , 2013 .
[6] Xin Zhou,et al. Study on security architecture in the Internet of Things , 2011, Proceedings of 2012 International Conference on Measurement, Information and Control.
[7] Shi Yan-rong,et al. Internet of Things Key Technologies and Architectures Research in Information Processing , 2013 .
[8] Raj Kulkarni,et al. Internet of Things: Architecture and Security , 2014 .
[9] Majid Sarrafzadeh,et al. The SmartCane system: an assistive device for geriatrics , 2008, BODYNETS.
[10] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[11] Roberto Manduchi,et al. Color Targets: Fiducials to Help Visually Impaired People Find Their Way by Camera Phone , 2007, EURASIP J. Image Video Process..
[12] David E. Culler,et al. Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[13] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[14] Nasser S. Abouzakhar,et al. Critical Infrastructure Cybersecurity : A Review of Recent Threats and Violations , 2013 .
[15] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[16] Mianxiong Dong,et al. A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities , 2016, IEEE Access.
[17] Mike Burmester,et al. RFID Security : Attacks , Countermeasures and Challenges , 2007 .
[18] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[19] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[20] Leslie Lenert,et al. MASCAL: RFID Tracking of Patients, Staff and Equipment to Enhance HospitalResponse to Mass Casualty Events , 2005, AMIA.
[21] Tzonelih Hwang,et al. BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.
[22] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[23] Mohamed F. Younis,et al. On handling QoS traffic in wireless sensor networks , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[24] Kamin Whitehouse,et al. Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.
[25] Hannu Tenhunen,et al. International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .
[26] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .
[27] Tian He,et al. SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.
[28] Ashok Hanjagi,et al. A Public Health Care Information System Using GIS and GPS: A Case Study of Shiggaon , 2007 .
[29] Benjamin K. S. Khoo,et al. RFID as an Enabler of the Internet of Things: Issues of Security and Privacy , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.
[30] I. A. Khatib,et al. Throughput Analysis of WEP Security in Ad Hoc Sensor Networks , 2005 .
[31] Maurizio A. Spirito,et al. Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[32] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.