-
آرشیو :
نسخه تابستان 1399
-
نوع مقاله :
پژوهشی
-
کد پذیرش :
1368
-
موضوع :
مهندسی نرم افزار
-
نویسنده/گان :
ساسان برهلیا، محمدباقر حق پرست، بردیا علاالديني، امیرحسین جورسرایی
-
کلید واژه :
اینترنت اشیاء، امنیت، مکانیزم امنیتی، امنیت اینترنت اشیاء.
-
مراجع :
[1] Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261-274.
[2] Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787-2805.
[3] Hussain, F. (2017). Internet of Things: Building Blocks and Business Models.
[4] Van Tilborg, H. C., & Jajodia, S. (Eds.). (2014). Encyclopedia of cryptography and security. Springer Science & Business Media.
[5] Ray, P. P. (2016). A survey on Internet of Things architectures. Journal of King Saud University-Computer and Information Sciences.
[6] Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454-1464.
[7] Bucherer, E., & Uckelmann, D. (2011). Business models for the internet of things. In Architecting the internet of things (pp. 253-277). Springer Berlin Heidelberg.
[8] Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things Security: A Survey. Journal of Network and Computer Applications.
[9] Borgia, E., Gomes, D. G., Lagesse, B., Lea, R. J., & Puccinelli, D. (2016). Special issue on “Internet of Things: Research challenges and Solutions”. Computer Communications, 89, 1-4.
[10] Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.
[11] Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497-1516.
[12] Di Pietro, R., Guarino, S., Verde, N. V., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks–a survey. Computer Communicatio-ns, 51, 1-20.
[13] Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266-2279.
[14] Bi, Z., Da Xu, L., & Wang, C. (2014). Internet of things for enterprise systems of modern manufacturing. IEEE Transactions on industrial informatics, 10(2), 1537-1546.
[15] Samaila, M. G., Neto, M., Fernandes, D. A., Freire, M. M., & Inácio, P. R. (2017). Security Challenges of the Internet of Things. In Beyond the Internet of Things (pp. 53-82). Springer International Publishing.
[16] Ukil, A., Sen, J., & Koilakonda, S. (2011, March). Embedded security for Internet of Things. In Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on (pp. 1-6). IEEE.
[17] Raza, S. (2013). Lightweight security solutions for the internet of things (Doctoral dissertation, Mälardalen University, Västerås, Sweden).
[18] Gamundani, A. M. (2015, May). An impact review on internet of things attacks. In Emerging Trends in Networks and Computer Communications (ETNCC), 2015 International Conference on (pp. 114-118). IEEE.
[19] Abomhara, M., & Køien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on (pp. 1-8). IEEE.
[20] Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
[21] Alqassem, I., & Svetinovic, D. (2014, December). A taxonomy of security and privacy requirements for the Internet of Things (IoT). In Industrial Engineering and Engineering Management (IEEM), 2014 IEEE International Conference on (pp. 1244-1248). IEEE.
[22] Xu, T., Wendt, J. B., & Potkonjak, M. (2014, November). Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (pp. 417-423). IEEE Press.
[23] Tamboli, J., Kaneria, R., Patoliya, D., & Ramani, S. (2014). Security in the Internet of Things. Communication, Cloud and Big Data: Proceedings of CCB 2014.
[24] Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
[25] Kanuparthi, A., Karri, R., & Addepalli, S. (2013, November). Hardware and embedded security in the context of internet of things. In Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles (pp. 61-64). ACM.
[26] Massis, B. (2016). The Internet of Things and its impact on the library. New Library World, 117(3/4), 289-292.
[27] Zhang, Y., Shen, Y., Wang, H., Yong, J., & Jiang, X. (2016). On secure wireless communications for IoT under eavesdropper collusion. IEEE Transactions on Automation Science and Engineering, 13(3), 1281-1293.
[28] Ma, H. D. (2011). Internet of things: Objectives and scientific challenges. Journal of Computer science and Technology, 26(6), 919-924.
[29] Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Context aware computing for the internet of things: A survey. IEEE Communications Surveys & Tutorials, 16(1), 414-454.
[30] Bi, Z., Wang, G., & Xu, L. D. (2016). A visualization platform for internet of things in manufacturing applications. Internet Research, 26(2), 377-401.
[31] Barreto, L., Celesti, A., Villari, M., Fazio, M., & Puliafito, A. (2015, August). An authentication model for IoT clouds. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 (pp. 1032-1035). ACM.
[32] Aman, W., & Snekkenes, E. (2015, December). Managing security trade-offs in the internet of things using adaptive security. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 362-368). IEEE.
[33] Ndibanje, B., Lee, H. J., & Lee, S. G. (2014). Security analysis and improvements of authentication and access control in the internet of things. Sensors, 14(8), 14786-14805.
[34] Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems Frontiers, 17(2), 243-259.
[35] Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision, 3(3), 34-36.
[36] Choi, J., Li, S., Wang, X., & Ha, J. (2012, June). A general distributed consensus algorithm for wireless sensor networks. In Wireless Advanced (WiAd), 2012 (pp. 16-21). IEEE.
[37] Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the internet of things. Computer, 46(4), 46-53.
[38] Covington, M. J., & Carskadden, R. (2013, June). Threat implications of the internet of things. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-12). IEEE.
[39] Akhunzada, A., Gani, A., Anuar, N. B., Abdelaziz, A., Khan, M. K., Hayat, A., & Khan, S. U. (2016). Secure and dependable software defined networks. Journal of Network and Computer Applications, 61, 199-221.
[40] Babar, S., Stango, A., Prasad, N., Sen, J., & Prasad, R. (2011, February). Proposed embedded security framework for internet of things (iot). In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on (pp. 1-5). IEEE.
[41] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
[42] Yao, X., Chen, Z., & Tian, Y. (2015). A lightweight attribute-based encryption scheme for the Internet of Things. Future Generation Computer Systems, 49, 104-112.
[43] Jiang, H., Shen, F., Chen, S., Li, K. C., & Jeong, Y. S. (2015). A secure and scalable storage system for aggregate data in IoT. Future Generation Computer Systems, 49, 133-141.
[44] Moosavi, S. R., Gia, T. N., Rahmani, A. M., Nigussie, E., Virtanen, S., Isoaho, J., & Tenhunen, H. (2015). SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Computer Science, 52, 452-459.
[45] Vučinić, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., & Guizzetti, R. (2015). OSCAR: Object security architecture for the Internet of Things. Ad Hoc Networks, 32, 3-16.
[46] Hashem, I. A. T., Chang, V., Anuar, N. B., Adewole, K., Yaqoob, I., Gani, A., ... & Chiroma, H. (2016). The role of big data in smart city. International Journal of Information Management, 36(5), 748-758.
[47] Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
[48] Chakrabarty, S., Engels, D. W., & Thathapudi, S. (2015, October). Black SDN for the Internet of Things. In Mobile Ad Hoc and Sensor Systems (MASS), 2015 IEEE 12th International Conference on (pp. 190-198). IEEE.
[49] Bagci, I. E., Raza, S., Chung, T., Roedig, U., & Voigt, T. (2013, June). Combined secure storage and communication for the internet of things. In 2013 IEEE International Conference on Sensing, Communications and Networking (SECON) (pp. 523-531). IEEE.
[50] Jucker, S. (2012). Securing the Constrained Application Protocol. no. October, 1-103.
[51] Hartke, K., & Bergmann, O. (2012). Datagram Transport Layer Security in Constrained Environments. draft-hartke-core-codtls-01 (work in progress).
[52] Naccache, D., & Sauveron, D. (Eds.). (2014). Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014, Proceedings (Vol. 8501). Springer.
[53] Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
- صفحات : 15-38
-
دانلود فایل
( 1.13 MB )