Security of the Internet of Things: perspectives and challenges

[1]  Christian Huitema,et al.  Transmission of IPv6 Packets over IEEE 802.11-OCB Networks , 2016 .

[2]  Serge Vaudenay,et al.  Pathchecker: An RFID application for tracing products in Supply-chains , 2015 .

[3]  Athanasios V. Vasilakos,et al.  Future Internet of Things: open issues and challenges , 2014, Wireless Networks.

[4]  Daqiang Zhang,et al.  VCMIA: A Novel Architecture for Integrating Vehicular Cyber-Physical Systems and Mobile Cloud Computing , 2014, Mobile Networks and Applications.

[5]  Marek Klonowski,et al.  Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[6]  Xiaofei Wang,et al.  Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.

[7]  Athanasios V. Vasilakos,et al.  Algorithm design for data communications in duty-cycled wireless sensor networks: A survey , 2013, IEEE Communications Magazine.

[8]  Jiafu Wan,et al.  Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[9]  Xu Xiaohui,et al.  Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.

[10]  Hossam S. Hassanein,et al.  A delay-tolerant framework for integrated RSNs in IoT , 2013, Comput. Commun..

[11]  Witold Pedrycz,et al.  An Evolutionary Multiobjective Sleep-Scheduling Scheme for Differentiated Coverage in Wireless Sensor Networks , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[12]  Refik Molva,et al.  CHECKER: on-site checking in RFID-based supply chains , 2012, WISEC '12.

[13]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[14]  Valérie Issarny,et al.  Ontologies for the internet of things , 2011, MDS '11.

[15]  Baoquan Zhang,et al.  Evaluation on security system of internet of things based on Fuzzy-AHP method , 2011, 2011 International Conference on E-Business and E-Government (ICEE).

[16]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[17]  Darko Kirovski,et al.  RFID-CoA: The RFID tags as certificates of authenticity , 2011, 2011 IEEE International Conference on RFID.

[18]  Min Chen,et al.  Mobile multimedia sensor networks: architecture and routing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[19]  Minyi Guo,et al.  TASA: Tag-Free Activity Sensing Using RFID Tag Arrays , 2011, IEEE Transactions on Parallel and Distributed Systems.

[20]  Guy Pujolle,et al.  HAT: HIP Address Translation protocol for Hybrid RFID/IP Internet of Things communication , 2010, 2010 International Conference on Wireless and Ubiquitous Systems.

[21]  Hailong Feng,et al.  Study of Recent Development about Privacy and Security of the Internet of Things , 2010, 2010 International Conference on Web Information Systems and Mining.

[22]  Meng Wu,et al.  Research on security management for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[23]  Qian Zhang,et al.  Code-Centric RFID System Based on Software Agent Intelligence , 2010, IEEE Intelligent Systems.

[24]  Leonid Smalov,et al.  Energy-aware Security in M-Commerce and the Internet of Things , 2009 .

[25]  Victor C. M. Leung,et al.  Spatial-Temporal relation-based Energy-Efficient Reliable routing protocol in wireless sensor networks , 2009, Int. J. Sens. Networks.

[26]  InChan Song,et al.  An Improved Reader Anti-Collision Algorithm Based on Pulse Protocol with Slot Occupied Probability in Dense Reader Mode , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[27]  Yi Liang,et al.  A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues , 2008, Proceedings of the IEEE.

[28]  Hai Liu,et al.  Taxonomy and Challenges of the Integration of RFID and Wireless Sensor Networks , 2008, IEEE Network.

[29]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[30]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[31]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[32]  Feza Buzluca,et al.  A New Mobility Aware Technique for Heterogeneous Mobile Ad Hoc Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[33]  Lei Zhang,et al.  Integration of RFID into Wireless Sensor Networks: Architectures, Opportunities and Challenging Problems , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.

[34]  Shengli Lai,et al.  ALOHA-Based Anti-Collision Algorithms Used in RFID System , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[35]  Yuping Zhao,et al.  A Novel Solution to the Reader Collision Problem in RFID System , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[36]  Claude Castelluccia,et al.  Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.

[37]  Zhong Chen,et al.  Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[38]  Gene Tsudik,et al.  YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[39]  Joongheon Kim,et al.  Effect of localized optimal clustering for reader anti-collision in RFID networks: fairness aspects to the readers , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..

[40]  Kiyoung Kim,et al.  A security framework with trust management for sensor networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..

[41]  Panayiotis Kotzanikolaou,et al.  Hybrid key establishment for multiphase self-organized sensor networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[42]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[43]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[44]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[45]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[46]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[47]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[48]  Gabriel Montenegro,et al.  Crypto-based identifiers (CBIDs): Concepts and applications , 2004, TSEC.

[49]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[50]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[51]  Sencun Zhu,et al.  LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.

[52]  Wade Trappe,et al.  An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.

[53]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[54]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[55]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[56]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[57]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[58]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[59]  Yuguang Fang,et al.  DEAR: A Device and Energy Aware Routing protocol for heterogeneous ad hoc networks , 2003, J. Parallel Distributed Comput..

[60]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[61]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[62]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[63]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[64]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[65]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[66]  Bruno Volckaert,et al.  A generic middleware-based platform for scalable cluster computing , 2002, Future Gener. Comput. Syst..

[67]  Dong-Ho Cho,et al.  A new routing scheme concerning energy conservation in wireless home ad-hoc networks , 2001, IEEE Trans. Consumer Electron..

[68]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[69]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[70]  Feng Xia,et al.  From machine-to-machine communications towards cyber-physical systems , 2013, Comput. Sci. Inf. Syst..

[71]  T. Kramp,et al.  Introduction to the Internet of Things , 2013 .

[72]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[73]  Fu Ying,et al.  Security Analysis and Security Model Research on IOT , 2012 .

[74]  Refik Molva,et al.  Tracker: Security and Privacy for RFID-based Supply Chains , 2010, NDSS.

[75]  Han Jian-jun,et al.  Service-oriented Middleware Model for Internet of Things , 2011 .

[76]  Muhammad Ibrahim,et al.  SPINS: Security Protocols for Sensor Networks , 2011 .

[77]  Artemis Moroni,et al.  Vision and Challenges for Realising the Internet of Things , 2010 .

[78]  Chen Wei,et al.  Security Characteristic and Technology in the Internet of Things , 2010 .

[79]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[80]  Qu Shen-feng,et al.  Research on China Internet of Things' Services and Management , 2006 .

[81]  Sarah Spiekermann,et al.  Maintaining Privacy in RFID Enabled Environments , 2005 .

[82]  Ding-Zhu Du,et al.  New ConstructionsOn BroadcastEncryptionand Key Pre-Distribution Schemes , 2004 .

[83]  Zhen Yang,et al.  Power and Mobility-aware Adaptive Dynamic Source Routing in MANET , 2004, SNPD.

[84]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[85]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[86]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .