IoT Architectures and Its Security: A Review
暂无分享,去创建一个
Sarvesh Tanwar | Sapna Saxena | Deepali Gupta | Latika Kakkar | Latika Kakkar | Sarvesh Tanwar | D. Gupta | Sapna Saxena
[1] Amardeep Das,et al. Firewall engine based on Graphics Processing Unit , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.
[2] B. Thirumala Rao,et al. A study on cloud based Internet of Things: CloudIoT , 2015, 2015 Global Conference on Communication Technologies (GCCT).
[3] Rui Li,et al. Towards a Low-Cost Remote Memory Attestation for the Smart Grid , 2015, Sensors.
[4] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[5] Jeng-Farn Lee,et al. TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks , 2011, IEEE Systems Journal.
[6] R Zito,et al. A review of travel-time prediction in transport and logistica , 2005 .
[7] Jia-Lun Tsai,et al. Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network , 2018, IEEE Systems Journal.
[8] Gary B. Wills,et al. Integration of Cloud Computing with Internet of Things: Challenges and Open Issues , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[9] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[10] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[11] William Haseman,et al. Time to decision: the drivers of innovation adoption decisions , 2014, Enterp. Inf. Syst..
[12] Geir M. Køien,et al. Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[13] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[14] Fabiano Hessel,et al. The Role of Lightweight Approaches Towards the Standardization of a Security Architecture for IoT Middleware Systems , 2016, IEEE Communications Standards.
[15] Bo Hu,et al. A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective , 2014, IEEE Internet of Things Journal.
[16] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[17] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[18] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[19] Song Ci,et al. A remote markerless human gait tracking for e-healthcare based on content-aware wireless multimedia communications , 2010, IEEE Wireless Communications.
[20] Rituparna Chaki,et al. Secure and trusted cloud of things , 2013, 2013 Annual IEEE India Conference (INDICON).
[21] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[22] Antonio Pescapè,et al. On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[23] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[24] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[25] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[26] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[27] Soma Bandyopadhyay,et al. Role Of Middleware For Internet Of Things: A Study , 2011 .
[28] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[29] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[30] Yaser Jararweh,et al. Internet of surveillance: a cloud supported large-scale wireless surveillance system , 2016, The Journal of Supercomputing.