Research on Security Issues of the Internet of Things

According to the current mainstream architecture of the Internet of Things, Makes research on security threat of the Internet of things from the perception layer, network layer and application layer, Gives the corresponding security policies and measures. It provides the theoretical reference for security of the Internet of things and privacy protection.

[1]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[2]  Tassos Dimitriou,et al.  A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[3]  Andrew S. Tanenbaum,et al.  RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.

[4]  Dimitrios Makrakis,et al.  Location privacy and anonymity preserving routing for wireless sensor networks , 2008, Comput. Networks.

[5]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[6]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[7]  Marc Langheinrich,et al.  Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols , 2004, UCS.

[8]  Chan Yeob Yeun,et al.  New mutual agreement protocol to secure mobile RFID-enabled devices , 2008, Inf. Secur. Tech. Rep..

[9]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[10]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[11]  Albrecht Schmidt,et al.  Perci: Pervasive Service Interaction with the Internet of Things , 2009, IEEE Internet Computing.

[12]  Romit Roy Choudhury,et al.  Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.

[13]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[14]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[15]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[16]  Shiuh-Pyng Shieh,et al.  Adaptive Random Key Distribution Schemes for Wireless Sensor Networks , 2005 .

[17]  K. Murugesan,et al.  A Cross-Layer Design to Improve Spectral Efficiency in Wireless Networks , 2011 .

[18]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[19]  Lei Zhang,et al.  A Fair Energy Conserving Routing Algorithm for Wireless Sensor Networks , 2004, EUSAI.

[20]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[21]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[22]  Yue Yin,et al.  A Mobile-Sink Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.

[23]  Matthew J. B. Robshaw,et al.  An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .

[24]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.