Smart home security: challenges, issues and solutions at different IoT layers
暂无分享,去创建一个
Fadi Al-Turjman | Rashid Amin | Muhammad Bilal | Mudassar Hussain | Haseeb Touqeer | Shakir Zaman | M. Bilal | F. Al-turjman | Rashid Amin | Mudassar Hussain | S. Zaman | Shakir Zaman | Haseeb Touqeer
[1] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[2] Muhammad Awais,et al. IoT based smart home: Security challenges, security requirements and solutions , 2017, 2017 23rd International Conference on Automation and Computing (ICAC).
[3] Carolyn Penstein Rosé,et al. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.
[4] Yan Zhang,et al. Wireless Big Data: Technologies and Applications , 2018, IEEE Wirel. Commun..
[5] Andreas Pitsillides,et al. Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.
[6] Seokung Yoon,et al. Security Issues on Smarthome in IoT Environment , 2015 .
[7] Seong-Il Jin,et al. Security Threats in Connected Car Environment and Proposal of In-Vehicle Infotainment-Based Access Control Mechanism , 2018, MUE/FutureTech.
[8] Jorge Portilla,et al. Distributed Reprogramming on the Edge: A New Collaborative Code Dissemination Strategy for IoT , 2019 .
[9] Xianbin Wang,et al. Security and privacy considerations for Wireless Sensor Networks in smart home environments , 2012, Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[10] Pál Varga,et al. Security threats and issues in automation IoT , 2017, 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS).
[11] Bernardi Pranggono,et al. Mobile Malware and Smart Device Security: Trends, Challenges and Solutions , 2013, 2013 19th International Conference on Control Systems and Computer Science.
[12] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[13] Aman Arora,et al. Security Concerns and Future Trends of Internet of Things , 2019, 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).
[14] Shadab Alam,et al. Security Threats, Attacks, and Possible Countermeasures in Internet of Things , 2020 .
[15] Biplab Sikdar,et al. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.
[16] Qusay H. Mahmoud,et al. A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[17] E. Ezhilarasan,et al. A Review on Mobile Technologies: 3G, 4G and 5G , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).
[18] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[19] Jens Grossklags,et al. Method Confusion Attack on Bluetooth Pairing , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[20] Erik M. Fredericks,et al. Uncertainty in big data analytics: survey, opportunities, and challenges , 2019, Journal of Big Data.
[21] Abderrazak Jemai,et al. A survey on security of IoT in the context of eHealth and clouds , 2016, 2016 11th International Design & Test Symposium (IDT).
[22] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[23] Zhu Han,et al. Jamming Mitigation via Hierarchical Security Game for IoT Communications , 2018, IEEE Access.
[24] Maurizio A. Spirito,et al. DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.
[25] Hesham F. A. Hamed,et al. Intrusion detection systems for IoT-based smart environments: a survey , 2018, Journal of Cloud Computing.
[26] Guowang Miao,et al. Latency-Energy Tradeoff Based on Channel Scheduling and Repetitions in NB-IoT Systems , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[27] Anita Gehlot,et al. Design and Development of IoT-Based Transmission Line Monitoring System , 2018 .
[28] Carsten Maple,et al. Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies , 2020, Electronics.
[29] Biplab Sikdar,et al. Detecting Forwarding Misbehavior In Clustered IoT Networks , 2018, Q2SWinet'18.
[30] Gautam Srivastava,et al. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.
[31] Chuck Yoo,et al. DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).
[32] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[33] Mostafa Nofal,et al. IoT-RTP and IoT-RTCP: Adaptive Protocols for Multimedia Transmission over Internet of Things Environments , 2017, IEEE Access.
[34] Monika Sachdeva,et al. Detection of Hello Flood Attack on LEACH in Wireless Sensor Networks , 2018 .
[35] Aalok Mehta,et al. The Spectrum Opportunity , 2013 .
[36] Maria Fazio,et al. A Watchdog Service Making Container-Based Micro-services Reliable in IoT Clouds , 2017, 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud).
[37] Alie El-Din Mady,et al. Moving Target Defense Mechanism for Side-Channel Attacks , 2020, IEEE Systems Journal.
[38] Andrew Kurtz,et al. Securing the Internet of Things (IoT): A Security Taxonomy for IoT , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[39] Syed Ali Hassan,et al. Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.
[40] Anton O. Prokofiev,et al. A method to detect Internet of Things botnets , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).
[41] Zheng Dou,et al. An Adaptive Resource Allocation Model With Anti-Jamming in IoT Network , 2019, IEEE Access.
[42] Mita Nasipuri,et al. A Novel Approach for Detecting and Mitigating the Energy Theft Issues in the Smart Metering Infrastructure , 2018 .
[43] Dimitri Konstantas,et al. A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model , 2018 .
[44] Young-Bae Ko,et al. Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks , 2016, Secur. Commun. Networks.
[45] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[46] John Ross Wallrabenstein. Practical and Secure IoT Device Authentication Using Physical Unclonable Functions , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[47] B. Janet,et al. Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection , 2020, Peer-to-Peer Netw. Appl..
[48] Ayman I. Kayssi,et al. IoT survey: An SDN and fog computing perspective , 2018, Comput. Networks.
[49] Bamidele Adebisi,et al. Internet of Things: Evolution and technologies from a security perspective , 2020, Sustainable Cities and Society.
[50] Habtamu Abie,et al. Towards metrics-driven adaptive security management in e-health IoT applications , 2012, BODYNETS.
[51] V. Bhuvaneswari,et al. The Internet of Things (IoT) Applications and Communication Enabling Technology Standards: An Overview , 2014, 2014 International Conference on Intelligent Computing Applications.
[52] Kyung Sup Kwak,et al. An Internet of Things-based health prescription assistant and its security system design , 2017, Future Gener. Comput. Syst..
[53] Muhammad Imran,et al. Perception layer security in Internet of Things , 2019, Future Gener. Comput. Syst..
[54] Tony R. Martinez,et al. A noise filtering method using neural networks , 2003, IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, 2003. SCIMA 2003..
[55] Ragib Hasan,et al. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.
[56] Chalee Thammarat,et al. Review of Internet of Things (IoT): Security Issue and Solution , 2020, 2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).
[57] Xiaojiang Du,et al. Security and Privacy in Wireless IoT , 2018, IEEE Wirel. Commun..
[58] Ueli Maurer,et al. Constructive Cryptography - A New Paradigm for Security Definitions and Proofs , 2011, TOSCA.
[59] Noor Zaman,et al. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) , 2019, Wirel. Networks.
[60] Zahoor Ahmed Alizai,et al. Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures , 2018, 2018 International Conference on Applied and Engineering Mathematics (ICAEM).
[61] Hao Wang,et al. Security-Driven hybrid collaborative recommendation method for cloud-based iot services , 2020, Comput. Secur..
[62] Byoungcheon Lee,et al. Security Framework for RFID-based Applications in Smart Home Environment , 2011, J. Inf. Process. Syst..
[63] Thomas Unterluggauer,et al. Sponge-Based Control-Flow Protection for IoT Devices , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[64] Shreyas Sen,et al. High efficiency power side-channel attack immunity using noise injection in attenuated signature domain , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
[65] Kusprasapta Mutijarsa,et al. Secure IoT Communication using Blockchain Technology , 2018, 2018 International Symposium on Electronics and Smart Devices (ISESD).
[66] Hairulnizam Mahdin,et al. Clone tag detection in distributed RFID systems , 2018, PloS one.
[67] Muttukrishnan Rajarajan,et al. An attack tree based risk evaluation approach for the internet of things , 2018, IOT.
[68] Mohsen Guizani,et al. Privacy in the Internet of Things for Smart Healthcare , 2018, IEEE Communications Magazine.
[69] Hong Li,et al. The Survey of RFID Attacks and Defenses , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[70] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[71] Zhiwei Wang,et al. Identity-Based Verifiable Aggregator Oblivious Encryption and Its Applications in Smart Grids , 2021, IEEE Transactions on Sustainable Computing.
[72] Munam Ali Shah,et al. IoT security: A layered approach for attacks & defenses , 2017, 2017 International Conference on Communication Technologies (ComTech).
[73] Sheetal Kalra,et al. Security in IoT-Based Smart Grid Through Quantum Key Distribution , 2018 .
[74] Tariq Aziz Rao,et al. Security Challenges Facing IoT Layers and its Protective Measures , 2018 .
[75] Ilango Krishnamurthi,et al. An efficacious method for detecting phishing webpages through target domain identification , 2014, Decis. Support Syst..
[76] Konstantinos E. Psannis,et al. Defending against phishing attacks: taxonomy of methods, current issues and future directions , 2017, Telecommunication Systems.
[77] Ramesh Karri,et al. Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.
[78] D. Bastos,et al. Internet of Things: A survey of technologies and security risks in smart home and city environments , 2018, IoT 2018.
[79] Hao Wang,et al. An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things , 2016, Mob. Inf. Syst..
[80] Andrea Zanella,et al. IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices , 2019, IEEE Internet of Things Journal.
[81] Xu Xiaohui,et al. Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.
[82] Tao Zhang,et al. Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.
[83] Hyunsoo Yoon,et al. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage , 2013, Comput. Electr. Eng..
[84] Lin Li,et al. Research on PKI-like Protocol for the Internet of Things , 2013, 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation.
[85] K SudeendraKumar,et al. Security Enhancements to System on Chip Devices for IoT Perception Layer , 2017, 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS).
[86] Chandrakumar Thangavel,et al. Security Challenges in the IoT Paradigm for Enterprise Information Systems , 2017 .
[87] Andreas Jacobsson,et al. On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[88] Daniel M. Batista,et al. A dependability evaluation tool for the Internet of Things , 2013, Comput. Electr. Eng..
[89] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[90] Amarsinh Vidhate,et al. Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[91] Dipti Jadhav,et al. Security threats in the application layer in IOT applications , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[92] Ricardo Neisse,et al. Security and privacy issues for an IoT based smart home , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[93] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[94] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[95] Jari Veijalainen,et al. Security and privacy threats in IoT architectures , 2012, BODYNETS.
[96] J. Guerreiro,et al. RELOAD/CoAP architecture for the federation of wireless sensor networks , 2020, Peer Peer Netw. Appl..
[97] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[98] Edward W. Knightly,et al. The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications , 2015, VLCS@MobiCom.
[99] Arnab Raha,et al. Energy-efficient system design for IoT devices , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[100] Audrey A. Gendreau,et al. Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[101] Xiaofeng Qiu,et al. Status-based Detection of malicious code in Internet of Things (IoT) devices , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).
[102] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[103] Sherali Zeadally,et al. A Survey on Hardware-based Security Mechanisms for Internet of Things , 2019, ArXiv.
[104] Mohammad Hammoudeh,et al. Social Engineering Attack Strategies and Defence Approaches , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[105] Hany F. Atlam,et al. IoT Security, Privacy, Safety and Ethics , 2019, Internet of Things.
[106] Do-Yeon Kim. Cyber security issues imposed on nuclear power plants , 2014 .
[107] Taeeun Kim,et al. Management platform of threats information in IoT environment , 2018, J. Ambient Intell. Humaniz. Comput..
[108] Neil W. Bergmann,et al. IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..
[109] Chetana Prakash,et al. Internet of Things (IoT): A vision, architectural elements, and security issues , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[110] Yuan Liu,et al. Study of secure boot with a FPGA-based IoT device , 2017, 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS).
[111] Sathish Alampalayam Kumar,et al. Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[112] Roksana Boreli,et al. Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[113] Sean Carlisto de Alvarenga,et al. A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..
[114] Aalok Mehta,et al. The Spectrum Opportunity: Sharing as the Solution to the Wireless Crunch , 2014 .
[115] Jose Romero-Mariona,et al. IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets , 2017, IoTBDS.
[116] Xiong Luo,et al. On Threat Analysis of IoT-Based Systems: A Survey , 2020, 2020 IEEE International Conference on Smart Internet of Things (SmartIoT).
[117] Somajyoti Majumder,et al. Application of wireless technology for a vision based rehabilitation system , 2016, 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).
[118] Sema F. Oktug,et al. Internet-of-Things security: Denial of service attacks , 2015, 2015 23nd Signal Processing and Communications Applications Conference (SIU).
[119] Kumar Yelamarthi,et al. Vulnerable C/C++ code usage in IoT software systems , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[120] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[121] Theodore Tryfonas,et al. The Internet of Things: a security point of view , 2016, Internet Res..
[122] C. M. Roberts,et al. Radio frequency identification (RFID) , 2006, Comput. Secur..
[123] S. Albert Rabara,et al. Internet of Things (IoT) based Smart Environment integrating various Business Applications , 2015 .
[124] Tarek R. Sheltami,et al. A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing , 2018, EUSPN/ICTH.
[125] Bhisham Sharma,et al. A survey on IoT architectures, protocols, security and smart city based applications , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[126] Dorothy E. Denning. Stuxnet: What Has Changed? , 2012, Future Internet.
[127] Mohsen Ghasemi,et al. Threats of Social Engineering Attacks Against Security of Internet of Things (IoT) , 2018, Lecture Notes in Electrical Engineering.
[128] Tai-hoon Kim,et al. A Review on Security in Smart Home Development , 2010 .