Security of the Internet of Things: perspectives and challenges
暂无分享,去创建一个
A. Vasilakos | J. Wan | Qi Jing | Jingwei Lu | Dechao Qiu
[1] Christian Huitema,et al. Transmission of IPv6 Packets over IEEE 802.11-OCB Networks , 2016 .
[2] Serge Vaudenay,et al. Pathchecker: An RFID application for tracing products in Supply-chains , 2015 .
[3] Athanasios V. Vasilakos,et al. Future Internet of Things: open issues and challenges , 2014, Wireless Networks.
[4] Daqiang Zhang,et al. VCMIA: A Novel Architecture for Integrating Vehicular Cyber-Physical Systems and Mobile Cloud Computing , 2014, Mobile Networks and Applications.
[5] Marek Klonowski,et al. Blocker-Type Methods for Protecting Customers' Privacy in RFID Systems , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[6] Xiaofei Wang,et al. Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.
[7] Athanasios V. Vasilakos,et al. Algorithm design for data communications in duty-cycled wireless sensor networks: A survey , 2013, IEEE Communications Magazine.
[8] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[9] Xu Xiaohui,et al. Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.
[10] Hossam S. Hassanein,et al. A delay-tolerant framework for integrated RSNs in IoT , 2013, Comput. Commun..
[11] Witold Pedrycz,et al. An Evolutionary Multiobjective Sleep-Scheduling Scheme for Differentiated Coverage in Wireless Sensor Networks , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[12] Refik Molva,et al. CHECKER: on-site checking in RFID-based supply chains , 2012, WISEC '12.
[13] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[14] Valérie Issarny,et al. Ontologies for the internet of things , 2011, MDS '11.
[15] Baoquan Zhang,et al. Evaluation on security system of internet of things based on Fuzzy-AHP method , 2011, 2011 International Conference on E-Business and E-Government (ICEE).
[16] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[17] Darko Kirovski,et al. RFID-CoA: The RFID tags as certificates of authenticity , 2011, 2011 IEEE International Conference on RFID.
[18] Min Chen,et al. Mobile multimedia sensor networks: architecture and routing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[19] Minyi Guo,et al. TASA: Tag-Free Activity Sensing Using RFID Tag Arrays , 2011, IEEE Transactions on Parallel and Distributed Systems.
[20] Guy Pujolle,et al. HAT: HIP Address Translation protocol for Hybrid RFID/IP Internet of Things communication , 2010, 2010 International Conference on Wireless and Ubiquitous Systems.
[21] Hailong Feng,et al. Study of Recent Development about Privacy and Security of the Internet of Things , 2010, 2010 International Conference on Web Information Systems and Mining.
[22] Meng Wu,et al. Research on security management for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[23] Qian Zhang,et al. Code-Centric RFID System Based on Software Agent Intelligence , 2010, IEEE Intelligent Systems.
[24] Leonid Smalov,et al. Energy-aware Security in M-Commerce and the Internet of Things , 2009 .
[25] Victor C. M. Leung,et al. Spatial-Temporal relation-based Energy-Efficient Reliable routing protocol in wireless sensor networks , 2009, Int. J. Sens. Networks.
[26] InChan Song,et al. An Improved Reader Anti-Collision Algorithm Based on Pulse Protocol with Slot Occupied Probability in Dense Reader Mode , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[27] Yi Liang,et al. A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues , 2008, Proceedings of the IEEE.
[28] Hai Liu,et al. Taxonomy and Challenges of the Integration of RFID and Wireless Sensor Networks , 2008, IEEE Network.
[29] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[30] David E. Culler,et al. Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.
[31] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[32] Feza Buzluca,et al. A New Mobility Aware Technique for Heterogeneous Mobile Ad Hoc Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.
[33] Lei Zhang,et al. Integration of RFID into Wireless Sensor Networks: Architectures, Opportunities and Challenging Problems , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.
[34] Shengli Lai,et al. ALOHA-Based Anti-Collision Algorithms Used in RFID System , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[35] Yuping Zhao,et al. A Novel Solution to the Reader Collision Problem in RFID System , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[36] Claude Castelluccia,et al. Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags , 2006, CARDIS.
[37] Zhong Chen,et al. Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[38] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[39] Joongheon Kim,et al. Effect of localized optimal clustering for reader anti-collision in RFID networks: fairness aspects to the readers , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[40] Kiyoung Kim,et al. A security framework with trust management for sensor networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[41] Panayiotis Kotzanikolaou,et al. Hybrid key establishment for multiphase self-organized sensor networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[42] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[43] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[44] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[45] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[46] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[47] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[48] Gabriel Montenegro,et al. Crypto-based identifiers (CBIDs): Concepts and applications , 2004, TSEC.
[49] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[50] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[51] Sencun Zhu,et al. LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.
[52] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[53] Roberto Di Pietro,et al. LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[54] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[55] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.
[56] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[57] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[58] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[59] Yuguang Fang,et al. DEAR: A Device and Energy Aware Routing protocol for heterogeneous ad hoc networks , 2003, J. Parallel Distributed Comput..
[60] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[61] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[62] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[63] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[64] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[65] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[66] Bruno Volckaert,et al. A generic middleware-based platform for scalable cluster computing , 2002, Future Gener. Comput. Syst..
[67] Dong-Ho Cho,et al. A new routing scheme concerning energy conservation in wireless home ad-hoc networks , 2001, IEEE Trans. Consumer Electron..
[68] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[69] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[70] Feng Xia,et al. From machine-to-machine communications towards cyber-physical systems , 2013, Comput. Sci. Inf. Syst..
[71] T. Kramp,et al. Introduction to the Internet of Things , 2013 .
[72] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[73] Fu Ying,et al. Security Analysis and Security Model Research on IOT , 2012 .
[74] Refik Molva,et al. Tracker: Security and Privacy for RFID-based Supply Chains , 2010, NDSS.
[75] Han Jian-jun,et al. Service-oriented Middleware Model for Internet of Things , 2011 .
[76] Muhammad Ibrahim,et al. SPINS: Security Protocols for Sensor Networks , 2011 .
[77] Artemis Moroni,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[78] Chen Wei,et al. Security Characteristic and Technology in the Internet of Things , 2010 .
[79] Roy Want,et al. An introduction to RFID technology , 2006, IEEE Pervasive Computing.
[80] Qu Shen-feng,et al. Research on China Internet of Things' Services and Management , 2006 .
[81] Sarah Spiekermann,et al. Maintaining Privacy in RFID Enabled Environments , 2005 .
[82] Ding-Zhu Du,et al. New ConstructionsOn BroadcastEncryptionand Key Pre-Distribution Schemes , 2004 .
[83] Zhen Yang,et al. Power and Mobility-aware Adaptive Dynamic Source Routing in MANET , 2004, SNPD.
[84] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[85] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[86] Yih-Chun Hu,et al. Wormhole Detection in Wireless Ad Hoc Networks , 2002 .