2 Related Works 2 . 1 Security Issues in the Internet of Things
暂无分享,去创建一个
[1] Wen-Guey Tzeng,et al. Key establishment schemes against storage-bounded adversaries in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[2] Syed Obaid Amin,et al. RIDES: Robust Intrusion Detection System for IP-Based Ubiquitous Sensor Networks , 2009, Sensors.
[3] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[4] Ken Sakamura,et al. Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things , 2010, IEEE Pervasive Computing.
[5] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[6] Gerhard P. Hancke,et al. Security Challenges for User-Oriented RFID Applications within the "Internet of Things" , 2010 .
[7] Li D. Xu. Information architecture for supply chain quality management , 2011 .
[8] Liang Zhou,et al. Multimedia traffic security architecture for the internet of things , 2011, IEEE Network.
[9] José María Sierra,et al. A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.
[10] William R. Claycomb,et al. A novel node level security policy framework for wireless sensor networks , 2011, J. Netw. Comput. Appl..
[11] Mohsen Guizani,et al. Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.
[12] Rodrigo Roman,et al. A cross-layer approach for integrating security mechanisms in sensor networks architectures , 2011, Wirel. Commun. Mob. Comput..
[13] Qiaoyan Wen,et al. Building the Internet of Things Using a Mobile RFID Security Protocol Based on Information Technology , 2011, CSISE.
[14] Huansheng Ning,et al. Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework? , 2011, IEEE Communications Letters.
[15] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[16] Sushil Jajodia,et al. Securing Topology Maintenance Protocols for Sensor Networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[17] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[18] Jianhua Ma,et al. Cyber-Individual Meets Brain Informatics , 2011, IEEE Intelligent Systems.
[19] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[20] Xuedong Liang,et al. A Taxonomy of Agent Technologies for Ubiquitous Computing Environments , 2012, KSII Trans. Internet Inf. Syst..
[21] Jianhua Ma,et al. Research Challenges and Perspectives on Wisdom Web of Things (W2T) , 2016, Semantic Web Technologies for Intelligent Engineering Applications.
[22] Marcella Atzori,et al. Blockchain-Based Architectures for the Internet of Things: A Survey , 2017 .