NB-IoT Security: A Survey
暂无分享,去创建一个
[1] Stephen Brown,et al. A Comparative Survey of LPWA Networking , 2018, ArXiv.
[2] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[3] Jiming Chen,et al. Narrowband Internet of Things: Implementations and Applications , 2017, IEEE Internet of Things Journal.
[4] Javier Gozalvez. New 3GPP Standard for IoT [Mobile Radio] , 2016, IEEE Vehicular Technology Magazine.
[5] Theofilos Chrysikos,et al. A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic Security , 2009, SEWCN.
[6] Erik Wilde,et al. From the Internet of Things to the Web of Things: Resource-oriented Architecture and Best Practices , 2011, Architecting the Internet of Things.
[7] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[8] Yuval Elovici,et al. Detection of Unauthorized IoT Devices Using Machine Learning Techniques , 2017, ArXiv.
[9] Kai Bu,et al. You Can Clone But You Cannot Hide: A Survey of Clone Prevention and Detection for RFID , 2017, IEEE Communications Surveys & Tutorials.
[10] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[11] Reza Ebrahimi Atani,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.
[12] Jin B. Hong,et al. A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..
[13] Jiajia Liu,et al. Smart Attacks against Intelligent Wearables in People-Centric Internet of Things , 2016, IEEE Communications Magazine.
[14] Xiaohu You,et al. Narrowband Wireless Access for Low-Power Massive Internet of Things: A Bandwidth Perspective , 2017, IEEE Wireless Communications.
[15] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[16] Wei Wang,et al. A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.
[17] Haider Abbas,et al. Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges , 2016, IEEE Access.
[18] Harit Shah,et al. Security Issues on Cloud Computing , 2013, ArXiv.
[19] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[20] Jong Hyuk Park,et al. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..
[21] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[22] Tarik Taleb,et al. An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.
[23] Debayan Das,et al. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.
[24] Ke Xu,et al. Mobile Mashup: Architecture, Challenges and Suggestions , 2009, 2009 International Conference on Management and Service Science.
[25] Ali Dehghantanha,et al. Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.
[26] Pritam Gajkumar Shah,et al. Security with IP Address Assignment and Spoofing for Smart IOT Devices , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[27] Gongpu Wang,et al. Secrecy outage probability analysis of multi-user multi-eavesdropper wireless systems , 2014, 2014 IEEE/CIC International Conference on Communications in China (ICCC).
[28] Guangyi Xiao,et al. User Interoperability With Heterogeneous IoT Devices Through Transformation , 2014, IEEE Transactions on Industrial Informatics.
[29] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[30] Ouajdi Korbaa,et al. A survey on attacks in Internet of Things based networks , 2017, 2017 International Conference on Engineering & MIS (ICEMIS).
[31] Walid Saad,et al. Jamming in the Internet of Things: A Game-Theoretic Perspective , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[32] Jemal H. Abawajy. Enhancing RFID Tag Resistance against Cloning Attack , 2009, 2009 Third International Conference on Network and System Security.
[33] Walaa Hamouda,et al. Cellular LTE-A Technologies for the Future Internet-of-Things: Physical Layer Features and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[34] Qinghan Xiao,et al. RFID Technology, Security Vulnerabilities, and Countermeasures , 2009 .
[35] Shui Yu,et al. Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks , 2018, IEEE Internet of Things Journal.
[36] Je-Hoon Lee,et al. Parallel Architecture for High-Speed Block Cipher, HIGHT , 2014 .
[37] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[38] Zygmunt J. Haas,et al. Security and Privacy in the Internet-of-Things Under Time-and-Budget-Limited Adversary Model , 2015, IEEE Wireless Communications Letters.
[39] Shigeng Zhang,et al. Deterministic Detection of Cloning Attacks for Anonymous RFID Systems , 2015, IEEE Transactions on Industrial Informatics.
[40] Mao Yuxing,et al. Weak node protection to maximize the lifetime of wireless sensor networks , 2018 .
[41] Carsten Bormann,et al. CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.
[42] Elisa Bertino,et al. Pareto Optimal Security Resource Allocation for Internet of Things , 2017, ACM Trans. Priv. Secur..
[43] Siobhán Clarke,et al. Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.
[44] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[45] Peter M. Will,et al. DASHER: A Prototype for Federated E-Commerce Services , 1997, IEEE Internet Comput..
[46] U. D. Dalal,et al. Performance Analysis of Black Hole Attack on WiMAX-WLAN Interface Network , 2012, 2012 Third International Conference on Computer and Communication Technology.
[47] Wei Jiang,et al. Lightweight RFID Protocol for Medical Privacy Protection in IoT , 2018, IEEE Transactions on Industrial Informatics.
[48] Emil C. Lupu,et al. Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.
[49] Rongxing Lu,et al. Securing the Internet of Things in a Quantum World , 2017, IEEE Communications Magazine.
[50] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[51] Sanjeev Jain,et al. Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network , 2018, IEEE Transactions on Vehicular Technology.
[52] Phone Lin,et al. A survey on NB-IoT downlink scheduling: Issues and potential solutions , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[53] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[54] Óscar García-Morchón,et al. End-to-End Transport Security in the IP-Based Internet of Things , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[55] Zoran Čekerevac,et al. INTERNET OF THINGS AND THE MAN-IN-THE-MIDDLE ATTACKS – SECURITY AND ECONOMIC RISKS , 2017 .
[56] Hao Xu,et al. An overview of 3GPP enhancements on machine to machine communications , 2016, IEEE Communications Magazine.
[57] Yacine Atif,et al. Securing the Web of Things with Role-Based Access Control , 2015, C2SI.
[58] Yong Tang,et al. Security of Web of Things: A Survey , 2016, IWSEC.
[59] Weidang Lu,et al. Small-Cell Assisted Secure Traffic Offloading for Narrowband Internet of Thing (NB-IoT) Systems , 2018, IEEE Internet of Things Journal.
[60] Sema F. Oktug,et al. Internet-of-Things security: Denial of service attacks , 2015, 2015 23nd Signal Processing and Communications Applications Conference (SIU).
[61] Sana Hoor Jokhio,et al. Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..
[62] Mianxiong Dong,et al. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[63] Justin P. Coon,et al. Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[64] Shahriar Mohammadi,et al. A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, ArXiv.
[65] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[66] Danda B. Rawat,et al. Evaluating Secrecy Outage of Physical Layer Security in Large-Scale MIMO Wireless Communications for Cyber-Physical Systems , 2017, IEEE Internet of Things Journal.
[67] Sanjay Kumar Madria,et al. Risk Assessment in a Sensor Cloud Framework Using Attack Graphs , 2017, IEEE Transactions on Services Computing.
[68] Fredrik Gunnarsson,et al. LTE release 14 outlook , 2016, IEEE Communications Magazine.
[69] Shin-Ming Cheng,et al. Traffic-Aware Patching for Cyber Security in Mobile IoT , 2017, IEEE Communications Magazine.
[70] Maurizio Rebaudengo,et al. A Key Distribution Scheme for Mobile Wireless Sensor Networks: $q$ - $s$ -Composite , 2017, IEEE Transactions on Information Forensics and Security.
[71] Muhammad Usman,et al. SIT: A Lightweight Encryption Algorithm for Secure Internet of Things , 2017, ArXiv.
[72] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[73] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[74] Ali Farrokhtala,et al. Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).
[75] Amirhossein Safi,et al. Improving the security of internet of things using encryption algorithms , 2017, 2017 International Conference on IoT and Application (ICIOT).
[76] Wenhao Wang,et al. A Replay-Attack Resistant Authentication Scheme for the Internet of Things , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[77] Chao Gao,et al. Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.
[78] Pawel Rotter,et al. A Framework for Assessing RFID System Security and Privacy Risks , 2008, IEEE Pervasive Computing.
[79] Chien-Ming Chen,et al. On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags , 2017, The Journal of Supercomputing.