Internet of things: a survey of challenges and issues
暂无分享,去创建一个
[1] Nalini Venkatasubramanian,et al. Privacy protecting data collection in media spaces , 2004, MULTIMEDIA '04.
[2] Xun Wang,et al. Sensor Network Configuration Under Physical Attacks , 2005, ICCNMC.
[3] Hannes Tschofenig,et al. Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.
[4] Kamlesh Gupta,et al. Security issues in wireless sensor networks , 2010 .
[5] Gregory D. Hager,et al. Systems Computing Challenges in the Internet of Things , 2016, ArXiv.
[6] Matthias Kovatsch,et al. Industry adoption of the Internet of Things: A constrained application protocol survey , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).
[7] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[8] Jörg Daubert,et al. A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[9] Frank Leymann,et al. Software service engineering: Tenets and challenges , 2009, 2009 ICSE Workshop on Principles of Engineering Service Oriented Systems.
[10] Jorge Sá Silva,et al. GINSENG: Performance Control in Wireless Sensor Networks , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[11] Deniz Erdogmus,et al. The Future of Human-in-the-Loop Cyber-Physical Systems , 2013, Computer.
[12] Joel J. P. C. Rodrigues,et al. Performance evaluation of RESTful web services and AMQP protocol , 2013, 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN).
[13] Konstantinos Kotis,et al. Semantic Interoperability on the Web of Things: The Semantic Smart Gateway Framework , 2012, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.
[14] Frank T. Johnsen,et al. Evaluation of transport protocols for web services , 2013, 2013 Military Communications and Information Systems Conference.
[15] Guang-Zhong Yang,et al. A Deep Learning Approach to on-Node Sensor Data Analytics for Mobile or Wearable Devices , 2017, IEEE Journal of Biomedical and Health Informatics.
[16] Ying Yang. Time Synchronization in Wireless Sensor Networks:A Survey , 2012 .
[17] Arijit Mukherjee,et al. ANGELS for distributed analytics in IoT , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[18] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[19] Gilles Grimaud,et al. Smews: Smart and Mobile Embedded Web Server , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.
[20] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[21] Jean-Marie Bonnin,et al. Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.
[22] Christoph Lenzen,et al. Optimal clock synchronization in networks , 2009, SenSys '09.
[23] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[24] Hyeonwoo Kim,et al. Correlation analysis of MQTT loss and delay according to QoS level , 2013, The International Conference on Information Networking 2013 (ICOIN).
[25] Vicente Pelechano,et al. Article in Press Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing towards the Model Driven Development of Context-aware Pervasive Systems , 2022 .
[26] Michael Weber,et al. Find my stuff: a search engine for everyday objects , 2012, MUM.
[27] Eddie Kohler,et al. Harbor: software-based memory protection for sensor nodes , 2007, IPSN '07.
[28] Zach Shelby,et al. Constrained RESTful Environments (CoRE) Link Format , 2012, RFC.
[29] Sunny Consolvo,et al. Lullaby: a capture & access system for understanding the sleep environment , 2012, UbiComp.
[30] Paolo Bellavista,et al. Convergence of MANET and WSN in IoT Urban Scenarios , 2013, IEEE Sensors Journal.
[31] Luigi Logrippo,et al. Platform for privacy preferences (P3P): Current status and future directions , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.
[32] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[33] Sirajum Munir,et al. Cyber Physical System Challenges for Human-in-the-Loop Control , 2013, Feedback Computing.
[34] Wolfgang Kastner,et al. Dependability demands and state of the art in the internet of things , 2015, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).
[35] Selo Sulistyo. Software Development Methods in the Internet of Things , 2013, ICT-EurAsia.
[36] Author. Platforms for the Internet of Things – An Analysis of Existing Solutions , 2013 .
[37] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[38] Eleri Cardozo,et al. A Resource-Oriented Architecture for the Internet of Things (IoT) , 2016 .
[39] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[40] Saša Radomirović,et al. Towards a Model for Security and Privacy in the Internet of Things , 2010 .
[41] Peter Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Core , 2011, RFC.
[42] Carles Gomez,et al. Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.
[43] Jaap-Henk Hoepman,et al. The Privacy Coach: Supporting customer privacy in the Internet of Things , 2010, IOT 2010.
[44] Hiroshi Ishii,et al. Threat Models and Security Issues in Wireless Sensor Networks , 2010 .
[45] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[46] Artem Katasonov,et al. Smart Semantic Middleware for the Internet of Things , 2008, ICINCO-ICSO.
[47] Yosuke Ishii,et al. Identifying and verifying clock synchronization protocol parameters , 2011, IoTSP '11.
[48] Xiaoping Ma,et al. Performance evaluation of MQTT and CoAP via a common middleware , 2014, 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[49] Cecilia Mascolo,et al. Contextual dissonance: design bias in sensor-based experience sampling methods , 2013, UbiComp.
[50] Ebraheim Alsaadi,et al. Internet of Things : Features , Challenges , and Vulnerabilities Authors , 2015 .
[51] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[52] Xinyu Song,et al. Modeling Impulsive Injections of Insulin: Towards Artificial Pancreas , 2012, SIAM J. Appl. Math..
[53] Jorge Sá Silva,et al. A Survey on Human-in-the-Loop Applications Towards an Internet of All , 2015, IEEE Communications Surveys & Tutorials.
[54] Srinivasan Seshan,et al. IrisNet: An Architecture for a Worldwide Sensor Web , 2003, IEEE Pervasive Comput..
[55] Sheng Huang,et al. TSAaaS: Time Series Analytics as a Service on IoT , 2014, 2014 IEEE International Conference on Web Services.
[56] Takuro Yonezawa,et al. Monitoring dependability of city-scale IoT using D-case , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[57] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[58] Carsten Bormann,et al. CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.
[59] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[60] Kay Römer,et al. No Dependability, No Internet of Things , 2014 .
[61] Roy Fielding,et al. Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation , 2000 .
[62] Thomas Engel,et al. Bluetooth Low Energy: An alternative technology for VANET applications , 2014, 2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS).
[63] O. Saeed,et al. Towards Internet of Things: Survey and Future Vision , 2013 .
[64] David L. Mills,et al. Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..
[65] Tao Wan,et al. Software development methods: SOA vs. CBD, OO and AOP , 2007 .
[66] M. A. Ansari,et al. A Survey: Soft Computing in Intelligent Information Retrieval Systems , 2012, 2012 12th International Conference on Computational Science and Its Applications.
[67] Ari Juels,et al. RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.
[68] Junwei Lv,et al. A new clock synchronization architecture of network for Internet of Things , 2011, International Conference on Information Science and Technology.
[69] Damien Cassou,et al. Toward a Tool-Based Development Methodology for Pervasive Computing Applications , 2012, IEEE Transactions on Software Engineering.
[70] Djamel Tandjaoui,et al. Internet of Things: Concept, Building blocks, Applications and Challenges , 2014, ArXiv.
[71] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[72] Ganesh K. Venayagamoorthy,et al. Computational Intelligence in Wireless Sensor Networks: A Survey , 2011, IEEE Communications Surveys & Tutorials.
[73] Mikko Tapani Karaiste. Delete: The virtue of forgetting in the digital age , 2010 .
[74] Björn Butzin,et al. Microservices approach for the internet of things , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).
[75] Giancarlo Fortino,et al. Agent-oriented modeling and simulation of IoT networks , 2016, 2016 Federated Conference on Computer Science and Information Systems (FedCSIS).
[76] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[77] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[78] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[79] Antonio F. Gómez-Skarmeta,et al. Light-Weight Multicast DNS and DNS-SD (lmDNS-SD): IPv6-Based Resource and Service Discovery for the Web of Things , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[80] Shruti Patil,et al. A Survey of the Internet of Things , 2016 .
[81] Laurence T. Yang,et al. Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[82] Ken Sakamura,et al. Challenges in the age of ubiquitous computing: a case study of T-Engine, an open development platform for embedded systems , 2006, ICSE.
[83] Jesus Alonso-Zarate,et al. A Survey on Application Layer Protocols for the Internet of Things , 2015 .
[84] Qusay Idrees Sarhan,et al. Security Attacks and Countermeasures for Wireless Sensor Networks: Survey , 2013 .
[85] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[86] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[87] J. Pokorny,et al. Web searching and information retrieval , 2004, Computing in Science & Engineering.
[88] John A. Stankovic,et al. Human in the loop: distributed data streams for immersive cyber-physical systems , 2008, SIGBED.
[89] Vinny Cahill,et al. Requirements for an ubiquitous computing simulation and emulation environment , 2006, InterSense '06.
[90] Song Guo,et al. The Web of Things: A Survey (Invited Paper) , 2011, J. Commun..
[91] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[92] Aboubaker Lasebae,et al. Security analysis of the constrained application protocol in the Internet of Things , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).
[93] Hong Linh Truong,et al. MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[94] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[95] Evangelos N. Gazis,et al. Short Paper: IoT: Challenges, projects, architectures , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.
[96] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[97] Komal Shringare,et al. Apache Hadoop Goes Realtime at Facebook , 2015 .
[98] Jie Liu,et al. SenseWeb: Browsing the Physical World in Real Time (Demo Abstract) , 2006 .
[99] Vladimir Oleshchuk,et al. Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[100] João Carlos Giacomin,et al. DynMAC: A resistant MAC protocol to coexistence in wireless sensor networks , 2015, Comput. Networks.
[101] Luiz Affonso Guedes,et al. A dependability evaluation for Internet of Things incorporating redundancy aspects , 2014, Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control.
[102] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.