An SDN-Enabled IoT Architecture with Fog Computing and Edge Encryption Support
暂无分享,去创建一个
[1] Jeremy Hilton,et al. A Reference Model of Information Assurance & Security , 2013, 2013 International Conference on Availability, Reliability and Security.
[2] Sanjay Jha,et al. The holes problem in wireless sensor networks: a survey , 2005, MOCO.
[3] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.
[4] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[5] Geng Wu,et al. M2M: From mobile to embedded internet , 2011, IEEE Communications Magazine.
[6] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[7] David C. Keezer,et al. A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs , 2015, WESS.
[8] Kevin Fu,et al. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[9] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[10] Jari Arkko,et al. Media Types for Sensor Markup Language (SenML) , 2012 .
[11] Minghui Zhang,et al. Architecture of Internet of Things and Its Key Technology Integration Based-On RFID , 2012, 2012 Fifth International Symposium on Computational Intelligence and Design.
[12] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Daniel W. Engels,et al. A secure IoT architecture for Smart Cities , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[15] Igor Radusinovic,et al. Software-Defined Fog Network Architecture for IoT , 2016, Wireless Personal Communications.
[16] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[17] Sugata Sanyal,et al. Sleep Deprivation Attack Detection in Wireless Sensor Network , 2012 .
[18] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[19] Erik Wilde,et al. A resource oriented architecture for the Web of Things , 2010, 2010 Internet of Things (IOT).
[20] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[21] Aikaterini Mitrokotsa,et al. Classification of RFID Attacks , 2008, IWRT.
[22] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[23] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[24] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[25] Manas Ranjan Patra,et al. Cloud Computing: Security Issues and Research Challenges , 2011 .
[26] Christian Bonnet,et al. An IoT gateway centric architecture to provide novel M2M services , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[27] Saqib Rasool Chaudhry,et al. IoT architecture challenges and issues: Lack of standardization , 2016, 2016 Future Technologies Conference (FTC).
[28] Raj Kulkarni,et al. Internet of Things: Architecture and Security , 2014 .
[29] Lan Li. Study on security architecture in the Internet of Things , 2012 .
[30] Niraj K. Jha,et al. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.
[31] Meng Zhang,et al. Trustworthiness of Medical Devices and Body Area Networks , 2014, Proceedings of the IEEE.
[32] R. Venkatesha Prasad,et al. A scalable distributed architecture towards unifying IoT applications , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[33] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .
[34] Susmita Sur-Kolay,et al. Physiological Information Leakage: A New Frontier in Health Information Security , 2016, IEEE Transactions on Emerging Topics in Computing.
[35] Lizhong Jin,et al. A Novel Secure Architecture for the Internet of Things , 2011, 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS).
[36] Nalini Venkatasubramanian,et al. A Software Defined Networking architecture for the Internet-of-Things , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[37] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.