A survey of secure middleware for the Internet of Things
暂无分享,去创建一个
[1] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[2] Bo Yang,et al. Efficient naming, addressing and profile services in Internet-of-Things sensory environments , 2014, Ad Hoc Networks.
[3] Christophe Chassot,et al. Monitoring solution for autonomic Middleware-level QoS management within IoT systems , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[4] Peter Rosengren,et al. A Development Platform for Integrating Wireless Devices and Sensors into Ambient Intelligence Systems , 2009, 2009 6th IEEE Annual Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks Workshops.
[5] Saša Radomirović,et al. Towards a Model for Security and Privacy in the Internet of Things , 2010 .
[6] Peter Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Core , 2011, RFC.
[7] Oleksiy Mazhelis,et al. Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications , 2014, Decis. Support Syst..
[8] Oscar Garcia-Morchon,et al. Securing the IP-based Internet of Things with DTLS , 2013 .
[9] Marco E. Pérez Hernández,et al. Autonomous and Self Controlling Smart Objects for the Future Internet , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.
[10] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[11] Ahmad-Reza Sadeghi,et al. Property-based attestation for computing platforms: caring about properties, not mechanisms , 2004, NSPW '04.
[12] Miika Komu,et al. Host Identity Protocol Architecture , 2019 .
[13] Ramjee Prasad,et al. Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[14] Didier Donsez,et al. CIRUS: an elastic cloud-based framework for Ubilytics , 2016, Ann. des Télécommunications.
[15] Judith Anne. Discovery in Service. , 1980 .
[16] Andreas Kliem. Cooperative Device Cloud , 2015 .
[17] S. Zarghami,et al. Middleware for the Internet of Things , 2013 .
[18] Daniele Miorandi,et al. Security policy enforcement for networked smart objects , 2016, Comput. Networks.
[19] Valérie Issarny,et al. ubiSOAP: A Service-Oriented Middleware for Ubiquitous Networking , 2012, IEEE Transactions on Services Computing.
[20] Mani B. Srivastava,et al. SensorAct: A Decentralized and Scriptable Middleware for Smart Energy Buildings , 2015, 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom).
[21] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[22] Luca Veltri,et al. IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios , 2015, IEEE Sensors Journal.
[23] João Nuno de Oliveira e Silva,et al. Poster: Unified RemoteU¡ for Mobile Environments , 2015, MobiCom.
[24] Oscar Garcia-Morchon,et al. Security Considerations in the IP-based Internet of Things , 2013 .
[25] Ivana Podnar Žarko,et al. Towards the cross-domain interoperability of IoT platforms , 2016, 2016 European Conference on Networks and Communications (EuCNC).
[26] Olena Kaykova,et al. UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments , 2010, 2010 Fifth International Conference on Internet and Web Applications and Services.
[27] Antonio F. Gómez-Skarmeta,et al. Privacy-Preserving Security Framework for a Social-Aware Internet of Things , 2014, UCAmI.
[28] Brian L. Mark,et al. A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.
[29] Brian L. Mark,et al. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.
[30] Mahdi Ben Alaya,et al. Harnessing XMPP for Machine-to-Machine Communications & Pervasive Applications , 2017 .
[31] Tom Caddy,et al. Side-Channel Attacks , 2016 .
[32] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[33] Adam Dunkels,et al. Efficient application integration in IP-based sensor networks , 2009, BuildSys '09.
[34] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[35] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[36] Joel Cartwright,et al. Practical experience with TCP over GPRS , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[37] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[38] Siobhán Clarke,et al. Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.
[39] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[40] Ning Lu,et al. Smart-grid security issues , 2010, IEEE Security & Privacy.
[41] Li Zhao,et al. A Cloud-Based Car Parking Middleware for IoT-Based Smart Cities: Design and Implementation , 2014, Sensors.
[42] Marcos Augusto M. Vieira,et al. Survey on wireless sensor network devices , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).
[43] Valérie Issarny,et al. Dioptase: a distributed data streaming middleware for the future web of things , 2014, Journal of Internet Services and Applications.
[44] Russ Housley,et al. Security flaws in 802.11 data link protocols , 2003, CACM.
[45] Robin Kravets,et al. Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[46] Jean-Marc Petit,et al. UbiWare: web-based dynamic data & service management platform for AmI , 2012, Middleware '12.
[47] Bart Jacobs,et al. Dismantling MIFARE Classic , 2008, ESORICS.
[48] Eve Maler,et al. Authentication and Authorization for Constrained Environments Using OAuth and UMA , 2015 .
[49] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[50] Benjamin Aziz,et al. Web API Management Meets the Internet of Things , 2015, SALAD@ESWC.
[51] Mike Ryan,et al. Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.
[52] Rafael Vasconcelos,et al. The Mobile Hub concept: Enabling applications for the Internet of Mobile Things , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[53] Daniel D. Giusto,et al. The Internet of Things: 20th Tyrrhenian Workshop on Digital Communications , 2014 .
[54] Thomas Schlegel,et al. Toward an execution system for self-healing workflows in cyber-physical systems , 2018, Software & Systems Modeling.
[55] Marga Marcos,et al. QoS Aware Middleware Support for Dynamically Reconfigurable Component Based IoT Applications , 2016, Int. J. Distributed Sens. Networks.
[56] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[57] T. Luckenbach,et al. TinyREST – a Protocol for Integrating Sensor Networks into the Internet , 2005 .
[58] Michel Robert,et al. Side Channel Attacks , 2011 .
[59] Wouter Joosen,et al. Middleware for efficient and confidentiality-aware federation of access control policies , 2013, Journal of Internet Services and Applications.
[60] Thomas Morris,et al. Trusted Platform Module , 2011, Encyclopedia of Cryptography and Security.
[61] Jules White,et al. NERD—middleware for IoT human machine interfaces , 2016, Ann. des Télécommunications.
[62] Edward Curry,et al. Thingsonomy: Tackling Variety in Internet of Things Events , 2015, IEEE Internet Computing.
[63] Ioan Ungurean,et al. A Middleware Based Architecture for the Industrial Internet of Things , 2016, KSII Trans. Internet Inf. Syst..
[64] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[65] Wang Lu,et al. A SOA based IOT communication middleware , 2011, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC).
[66] Nader Mohamed,et al. Challenges in middleware solutions for the internet of things , 2012, 2012 International Conference on Collaboration Technologies and Systems (CTS).
[67] Ann Cavoukian,et al. Privacy in the clouds , 2008 .
[68] Ernest F. Brickell,et al. Direct anonymous attestation , 2004, CCS '04.
[69] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[70] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[71] Cullen Jennings,et al. Network Address Translation (NAT) Behavioral Requirements for Unicast UDP , 2007, RFC.
[72] K. Suzanne Barber,et al. Learning trust strategies in reputation exchange networks , 2006, AAMAS '06.
[73] Prabath Siriwardena. User Managed Access (UMA) , 2014 .
[74] Samia Bouzefrane,et al. Middleware to Integrate Mobile Devices, Sensors and Cloud Computing , 2015, ANT/SEIT.
[75] Andrew P. Martin,et al. Hardware Security for Device Authentication in the Smart Grid , 2012, SmartGridSec.
[76] Sophie Chabridon,et al. Enhancing context data distribution for the internet of things using qoc-awareness and attribute-based access control , 2016, Ann. des Télécommunications.
[77] Mohit Sethi,et al. Security in Smart Object Networks , 2012 .
[78] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[79] Karl Aberer,et al. Middleware support for the "Internet of Things" , 2006 .
[80] Jia Liang,et al. A Middleware for Environmental Monitoring and Control , 2016, 2016 IEEE International Conference on Services Computing (SCC).
[81] David Svensson Fors,et al. Ad-hoc composition of pervasive services in the PalCom architecture , 2009, ICPS '09.
[82] John Lyle,et al. On the challenges of building a web-based ubiquitous application platform , 2012, UbiComp '12.
[83] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[84] Lei Zhang,et al. An Event-driven Service-oriented Architecture for Internet of Things Service Execution , 2015, Int. J. Online Eng..
[85] Ernesto Damiani,et al. XML Security , 2007, Security, Privacy, and Trust in Modern Data Management.
[86] Manuel Koschuch,et al. Performance evaluation of the TLS handshake in the context of embedded devices , 2010, 2010 International Conference on Data Communication Networking (DCNET).
[87] Antonio F. Gómez-Skarmeta,et al. Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..
[88] Arun Kumar Sangaiah,et al. MIFIM - Middleware solution for service centric anomaly in future internet models , 2017, Future Gener. Comput. Syst..
[89] Srdjan Krco,et al. Performance evaluation of compact binary XML representation for constrained devices , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[90] Athanasios V. Vasilakos,et al. A knowledge-based resource discovery for Internet of Things , 2016, Knowl. Based Syst..
[91] Michael Steil,et al. Mistakes Microsoft Made in the Xbox Security System , 2022 .
[92] Soma Bandyopadhyay,et al. Role Of Middleware For Internet Of Things: A Study , 2011 .
[93] Sergei Skorobogatov,et al. The bumpy road towards iPhone 5c NAND mirroring , 2016, ArXiv.
[94] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[95] Mumin Song,et al. A Novel Fast Training Method for SVM and Its Application in Fault Diagnosis of Service Robot , 2015, Int. J. Online Eng..
[96] Atta Badii,et al. A Policy Model for Secure Information Flow , 2009, ARSPA-WITS.
[97] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[98] Andrew James Simmonds,et al. An Ontology for Network Security Attacks , 2004, AACC.
[99] Peter W. Shor. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .
[100] Xiaoping Ma,et al. Performance evaluation of MQTT and CoAP via a common middleware , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[101] Wouter Joosen,et al. Hitch hiker: a remote binding model with priority based data aggregation for wireless sensor networks , 2015, 2015 18th International ACM SIGSOFT Symposium on Component-Based Software Engineering (CBSE).
[102] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[103] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[104] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[105] Bruno Crispo,et al. Performance evaluation of XACML PDP implementations , 2008, SWS '08.
[106] Muthoni Masinde,et al. Implementation of middleware for Internet of Things in asset tracking applications: In-lining approach , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).
[107] Soma Bandyopadhyay,et al. A Survey of Middleware for Internet of Things , 2011, WiMo/CoNeCo.
[108] Prem Prakash Jayaraman,et al. MOSDEN: An Internet of Things Middleware for Resource Constrained Mobile Devices , 2013, 2014 47th Hawaii International Conference on System Sciences.
[109] Pawel Maslanka,et al. Hi-Speed USB Based Middleware for Integration of Real-Time Systems with the Cloud , 2016, Int. J. Distributed Sens. Networks.
[110] Steve Furber,et al. ARM System Architecture , 1996 .
[111] Vladislav Perelman,et al. TLS with PSK for Constrained Devices , 2012 .
[112] P. Hanks,et al. Collins dictionary of the English language , 1979 .
[113] L MarkBrian,et al. Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2007 .
[114] Álvaro Enrique Arenas,et al. A Utility-Based Reputation Model for the Internet of Things , 2016, SEC.
[115] Cyrille Bertelle,et al. EMMA: A Resource Oriented Framework for Service Choreography over Wireless Sensor and Actor Networks , 2015, ArXiv.
[116] Jean Jacques Moreau,et al. SOAP Version 1. 2 Part 1: Messaging Framework , 2003 .
[117] Sergei Skorobogatov,et al. Semi-invasive attacks: a new approach to hardware security analysis , 2005 .
[118] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[119] Frank Golatowski,et al. SIRENA - Service Infrastructure for Real-time Embedded Networked Devices: A service oriented framework for different domains , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[120] Enrico Macii,et al. Event-Driven User-Centric Middleware for Energy-Efficient Buildings and Public Spaces , 2016, IEEE Systems Journal.
[121] Benjamin Aziz,et al. OAuthing: Privacy-enhancing federation for the Internet of Things , 2016, 2016 Cloudification of the Internet of Things (CIoT).
[122] Jaroslaw Domaszewicz,et al. Middleware Mechanisms for Agent Mobility in Wireless Sensor and Actuator Networks , 2012, S-CUBE.
[123] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[124] Aniruddha S. Gokhale,et al. Distributed Real-Time Managed Systems: A Model-Driven Distributed Secure Information Architecture Platform for Managed Embedded Systems , 2014, IEEE Software.
[125] Kim Andersson,et al. Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk , 2011 .
[126] Daniele Miorandi,et al. A secure and quality-aware prototypical architecture for the Internet of Things , 2016, Inf. Syst..
[127] Charles P. Pfleeger,et al. Security in computing , 1988 .
[128] Jaroslaw Domaszewicz,et al. Node/Proxy portability: Designing for the two lives of your next WSAN middleware , 2016, J. Syst. Softw..
[129] Jenifer Sunrise Winter. Privacy and the emerging Internet of Things: Using the framework of contextual integrity to inform policy , 2012 .
[130] Namje Park,et al. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle , 2015, Sensors.
[131] Spyros Lalis,et al. Unified Service-Oriented Access for WSNs and Dynamically Deployed Application Tasks , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[132] Dominique Guinard,et al. SOCRADES: A Web Service Based Shop Floor Integration Infrastructure , 2008, IOT.
[133] Song Y. Yan. Side-Channel Attacks , 2008 .
[134] Ki-Woong Park,et al. pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[135] Rodrigo Román Castro,et al. SMEPP: A Secure Middleware For Embedded P2P , 2009 .
[136] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[137] Anton Naumenko,et al. A Security Framework for Smart Ubiquitous Industrial Resources , 2007, IESA.
[138] Amel Bouzeghoub,et al. INCOME - Multi-scale Context Management for the Internet of Things , 2012, AmI.
[139] Odej Kao,et al. The Device Cloud - Applying Cloud Computing Concepts to the Internet of Things , 2014, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops.
[140] Răzvan Viorescu. 2018 REFORM OF EU DATA PROTECTION RULES , 2017 .
[141] L Robertson. Introduction to operating systems , 1990 .
[142] Filippo Palumbo,et al. Taking Arduino to the Internet of Things: The ASIP programming model , 2016, Comput. Commun..
[143] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[144] Gabi Nakibly,et al. Mobile Device Identification via Sensor Fingerprinting , 2014, ArXiv.
[145] Jari Arkko,et al. End-to-end security for sleepy smart object networks , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[146] Rafael Vasconcelos,et al. An Adaptive Middleware for Opportunistic Mobile Sensing , 2015, 2015 International Conference on Distributed Computing in Sensor Systems.
[147] Benjamin Aziz,et al. Federated Identity and Access Management for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.
[148] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[149] Maurizio A. Spirito,et al. The VIRTUS Middleware: An XMPP Based Architecture for Secure IoT Communications , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[150] Gheorghe Cosmin Silaghi,et al. Reputation-based trust management systems and their applicability to grids , 2007 .
[151] George Eleftherakis,et al. Architecting the IoT Paradigm: A Middleware for Autonomous Distributed Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[152] Prateek Anand,et al. Enabling Context-Aware Computing in Internet of Things Using M2M , 2015, 2015 IEEE International Symposium on Nanoelectronic and Information Systems.
[153] Jaeho Kim,et al. A device software platform for consumer electronics based on the internet of things , 2015, IEEE Transactions on Consumer Electronics.
[154] Christian Kay,et al. The Oxford English Dictionary Online , 2004, Lit. Linguistic Comput..
[155] J.M. Bradshaw,et al. Context-based security management for multi-agent systems , 2005, IEEE 2nd Symposium on Multi-Agent Security and Survivability, 2005..