Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions
暂无分享,去创建一个
[1] Georges Kaddoum,et al. A Survey on Intelligent MAC Layer Jamming Attacks and Countermeasures in WSNs , 2016, 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall).
[2] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[3] Soo Young Shin,et al. Swapped Huffman tree coding application for low-power wide-area network (LPWAN) , 2016, 2016 International Conference on Smart Green Technology in Electrical and Information Systems (ICSGTEIS).
[4] Rob Enns,et al. NETCONF Configuration Protocol , 2006, RFC.
[5] Qi Zhang,et al. An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security , 2020, IEEE Transactions on Services Computing.
[6] Kevin W. Sowerby,et al. Robustness of radiometric fingerprinting in the presence of an impersonator , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[7] Debayan Das,et al. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.
[8] Xueying Yang. LoRaWAN: Vulnerability Analysis and Practical Expoitation , 2017 .
[9] Joanna Domanska,et al. Self-Aware Networks That Optimize Security, QoS, and Energy , 2020, Proceedings of the IEEE.
[10] Sarah Ruepp,et al. Security Issues in Internet of Things: Vulnerability Analysis of LoRaWAN, Sigfox and NB-IoT , 2019, 2019 Global IoT Summit (GIoTS).
[11] Xin Huang,et al. S2Net: A Security Framework for Software Defined Intelligent Building Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[12] Sheikh Ariful Islam,et al. Machine Learning Based IoT Edge Node Security Attack and Countermeasures , 2019, 2019 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[13] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[14] Sujata Banerjee,et al. SDN and OpenFlow Evolution: A Standards Perspective , 2014, Computer.
[15] Mianxiong Dong,et al. A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities , 2016, IEEE Access.
[16] Deqing Zou,et al. Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms , 2020, Comput. Networks.
[17] Shadab Alam,et al. Security Threats, Attacks, and Possible Countermeasures in Internet of Things , 2020 .
[18] Ellen W. Zegura,et al. An architecture for active networking , 1997, HPN.
[19] Miklós Kozlovszky,et al. Security Survey of Dedicated IoT Networks in the Unlicensed ISM Bands , 2018, 2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI).
[20] Kun-Lin Tsai,et al. TTP Based High-Efficient Multi-Key Exchange Protocol , 2016, IEEE Access.
[21] Martín Casado,et al. Ethane: taking control of the enterprise , 2007, SIGCOMM '07.
[22] Thiemo Voigt,et al. 6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.
[23] Chunhua Jin,et al. Secure and efficient data transmission in the Internet of Things , 2015, Telecommunication Systems.
[24] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[25] Marwa Qaraqe,et al. Applications of Artificial Intelligence and Machine Learning in the Area of SDN and NFV: A Survey , 2019, 2019 16th International Multi-Conference on Systems, Signals & Devices (SSD).
[26] Jong Min Kim,et al. Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks , 2016, J. Sensors.
[27] Georgios Kambourakis,et al. Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.
[28] Anne Fladenmuller,et al. Self-configuration mechanisms for SDN deployment in Wireless Mesh Networks , 2017, 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[29] Fernando A. Kuipers,et al. Security Vulnerabilities in LoRaWAN , 2018, 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI).
[30] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[31] Denny Darlis,et al. An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).
[32] Antonio Skarmeta,et al. Security Management Architecture for NFV/SDN-Aware IoT Systems , 2019, IEEE Internet of Things Journal.
[33] Antonio F. Gómez-Skarmeta,et al. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach , 2018, Sensors.
[34] Fang Liu,et al. Real-Time Detection of Clone Attacks in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[35] Adnan M. Abu-Mahfouz,et al. Utilising artificial intelligence in software defined wireless sensor network , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.
[36] Amitava Ghosh,et al. NB-IoT deployment study for low power wide area cellular IoT , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[37] Yogita Hande,et al. A Survey on Intrusion Detection System for Software Defined Networks (SDN) , 2020, Int. J. Bus. Data Commun. Netw..
[38] Petr Dolezel,et al. Industrial Network Protection by SDN-Based IPS with AI , 2020, ACIIDS.
[39] Zheng Yan,et al. Software Defined Intelligent Building , 2015, Int. J. Inf. Secur. Priv..
[40] Xianglin Wei,et al. Collaborative mobile jammer tracking in Multi-Hop Wireless Network , 2018, Future Gener. Comput. Syst..
[41] Utz Roedig,et al. LoRa for the Internet of Things , 2016, EWSN.
[42] Lei Wang,et al. QoE Oriented Cognitive Network Based on Machine Learning and SDN , 2019, 2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN).
[43] Leila Azouz Saidane,et al. Enhancing the security of the IoT LoraWAN architecture , 2016, 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN).
[44] M. Shamim Hossain,et al. A software defined network routing in wireless multihop network , 2017, J. Netw. Comput. Appl..
[45] Junqing Zhang,et al. Experimental Investigation on Wireless Key Generation for Low-Power Wide-Area Networks , 2020, IEEE Internet of Things Journal.
[46] Jacobus E. van der Merwe,et al. Switchlets and Dynamic Virtual ATM Networks , 1997, Integrated Network Management.
[47] Qiao Yan,et al. Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT , 2019, 2019 Computing, Communications and IoT Applications (ComComAp).
[48] Arjuna Sathiaseelan,et al. Software-defined wireless mesh networks for internet access sharing , 2015, Comput. Networks.
[49] Walid Saad,et al. Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.
[50] Md. Zakirul Alam Bhuiyan,et al. Improving Internet of Things (IoT) Security with Software-Defined Networking (SDN) , 2020, Comput..
[51] Nouha Oualha,et al. Lightweight Attribute-Based Encryption for the Internet of Things , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).
[52] Susan Hares,et al. Network Programmability With ForCES , 2015, IEEE Communications Surveys & Tutorials.
[53] Kwangjo Kim,et al. Weighted Feature Selection Techniques for Detecting Impersonation Attack in Wi-Fi Networks , 2016 .
[54] Raheem Beyah,et al. GTID: A Technique for Physical Device and Device Type Fingerprinting , 2015, IEEE Transactions on Dependable and Secure Computing.
[55] Mani Mina,et al. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.
[56] Konstantin Mikhaylov,et al. On Track of Sigfox Confidentiality with End-to-End Encryption , 2018, ARES.
[57] Reza Malekian,et al. Software defined wireless sensor networks application opportunities for efficient network management: A survey , 2017, Comput. Electr. Eng..
[58] JaeHyu Kim,et al. A Dual Key-Based Activation Scheme for Secure LoRaWAN , 2017, Wirel. Commun. Mob. Comput..
[59] Kun-Lin Tsai,et al. AES-128 Based Secure Low Power Communication for LoRaWAN IoT Environments , 2018, IEEE Access.
[60] Kuan Zhang,et al. An Improved Secure Key Management Scheme for LoRa System , 2019, 2019 IEEE 19th International Conference on Communication Technology (ICCT).
[61] S. V. Manisekaran,et al. An analysis of software-defined routing approach for wireless sensor networks , 2016, Comput. Electr. Eng..
[62] B. Sieka,et al. Active fingerprinting of 802.11 devices by timing analysis , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[63] Daniel W. Engels,et al. A secure IoT architecture for Smart Cities , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[64] Robert H. Deng,et al. Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..
[65] Biao Han,et al. Distributed Physical Layer Key Generation for Secure LPWAN Communication , 2019, 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS).
[66] Gustavo B. Figueiredo,et al. Improving QoS and QoE Through Seamless Handoff in Software-Defined IEEE 802.11 Mesh Networks , 2017, IEEE Communications Letters.
[67] Mahesh Sooriyabandara,et al. Low Power Wide Area Networks: An Overview , 2016, IEEE Communications Surveys & Tutorials.
[68] Zhi Chen,et al. A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..
[69] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[70] Miroslav Voznak,et al. Protecting Gateway from ABP Replay Attack on LoRaWAN , 2018 .
[71] Georgios Kambourakis,et al. Lightweight algorithm for protecting SDN controller against DDoS attacks , 2017, 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC).
[72] Youngseop Kim,et al. An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system , 2016, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).
[73] Nikolaos Scarmeas,et al. The good, bad, and ugly? , 2012, Neurology.
[74] Arjen Hommersom,et al. Denial-of-Service Attacks on LoRaWAN , 2018, ARES.
[75] Nick Feamster,et al. Improving network management with software defined networking , 2013, IEEE Commun. Mag..
[76] Mohsen Guizani,et al. Software-defined networking security: pros and cons , 2015, IEEE Communications Magazine.
[77] Andrew T. Campbell,et al. Open Signaling for ATM, INTERNET and Mobile Networks (OPENSIG'98) , 1999, OPSR.
[78] Danny Hughes,et al. Exploring the Security Vulnerabilities of LoRa , 2017, 2017 3rd IEEE International Conference on Cybernetics (CYBCON).
[79] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[80] Lexi Xu,et al. Research on SDN/NFV Network Traffic Management and Optimization based on Big Data and Artificial Intelligence , 2018, 2018 18th International Symposium on Communications and Information Technologies (ISCIT).
[81] Yacine Challal,et al. C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things , 2014, 2014 International Conference on Advanced Networking Distributed Systems and Applications.
[82] Mangal Sain,et al. Survey on security in Internet of Things: State of the art and challenges , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[83] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[84] Tobias Zillner,et al. ZigBee Exploited The good , the bad and the ugly , 2015 .
[85] Denis A. Letavin,et al. Comparative analysis of standards for Low-power Wide-area Network , 2017, 2017 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SINKHROINFO).
[86] Thierry Turletti,et al. A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks , 2014, IEEE Communications Surveys & Tutorials.
[87] Sven Dietrich,et al. Network Attack Detection and Defense – Security Challenges and Opportunities of Software-Defined Networking , 2017 .
[88] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[89] Sarah Abdallah,et al. Identity-based authentication scheme for the Internet of Things , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).
[90] Gurusamy Mohan,et al. Dynamic attack detection and mitigation in IoT using SDN , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[91] Arjan Durresi,et al. Service Cost in Software Defined Networking (SDN) , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).
[92] James Michaelis,et al. SPF: An SDN-based middleware solution to mitigate the IoT information explosion , 2016, 2016 IEEE Symposium on Computers and Communication (ISCC).
[93] Priyadarsi Nanda,et al. Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[94] Sanjay Pawar,et al. Firewall and load balancing as an application of SDN , 2016, 2016 Conference on Advances in Signal Processing (CASP).
[95] Seemab Latif,et al. Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques , 2014, 2014 National Software Engineering Conference.
[96] Andrea Zanella,et al. Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios , 2015, IEEE Wireless Communications.
[97] Jidong Wang,et al. An Enhanced Key Management Scheme for LoRaWAN , 2018, SpaCCS.
[98] Andrea Zanella,et al. Long-Range IoT Technologies: The Dawn of LoRa™ , 2015, FABULOUS.
[99] S. Mercy Shalinie,et al. Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture , 2020, IEEE Internet of Things Journal.
[100] Kaiming Liu,et al. A novel min-cost Qos routing algorithm for SDN-based wireless mesh network , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[101] Yasir Mehmood,et al. Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.
[102] Ramon Sanchez-Iborra,et al. State of the Art in LP-WAN Solutions for Industrial IoT Services , 2016, Sensors.
[103] Zubair A. Baig,et al. SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks , 2019, IEEE Access.
[104] Jonathan Rodriguez,et al. Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure , 2018, 2018 IEEE International Conference on Communications (ICC).
[105] Fernand Meyer,et al. A comparative study of LPWAN technologies for large-scale IoT deployment , 2019, ICT Express.
[106] Zhu Han,et al. Jamming Mitigation via Hierarchical Security Game for IoT Communications , 2018, IEEE Access.
[107] Jidong Wang,et al. An Enhanced Key Management Scheme for LoRaWAN , 2018, Cryptogr..
[108] Ilsun You,et al. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System , 2018, Sensors.
[109] Panagiotis G. Sarigiannidis,et al. Securing the Internet of Things: Challenges, threats and solutions , 2019, Internet Things.
[110] OthmanMazliza,et al. Internet of Things security , 2017 .
[111] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[112] Jorge Bernal Bernabe,et al. Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems , 2020, Sensors.
[113] Simone Zulian,et al. Security threat analysis and countermeasures for LoRaWAN join procedure , 2016 .
[114] Ren-Hung Hwang,et al. Energy Depletion Attacks in Low Power Wireless Networks , 2019, IEEE Access.
[115] Smilty Chacko,et al. Security mechanisms and Vulnerabilities in LPWAN , 2018, IOP Conference Series: Materials Science and Engineering.