A survey of edge computing-based designs for IoT security
Tài liệu tham khảo
Gubbi, 2013, Internet of things (iot): a vision, architectural elements, and future directions, Future Gener. Comput. Syst., 29, 1645, 10.1016/j.future.2013.01.010
Lin, 2017, A survey on internet of things: architecture, enabling technologies, security and privacy, and applications, IIEEE Internet Things (IoT) J., 99
Sha, 2018, On security challenges and open issues in internet of things, Future Gener. Comput. Syst., 83, 326, 10.1016/j.future.2018.01.059
Brewster
Russon
Sha, 2016, Security in internet of things: opportunities and challenges
Alramadhan, 2017, An overview of access control mechanisms for internet of things
Chen, 2018, Efficient ring signature and group signature schemes based on q-ary identification protocols, Comput. J., 61, 545, 10.1093/comjnl/bxx112
Wang, 2013, Slight homomorphic signature for access controlling in cloud computing, Wirel. Pers. Commun., 73, 51, 10.1007/s11277-012-0977-8
Shi, 2016, Edge computing: vision and challenges, IEEE Internet. Things J., 3, 637, 10.1109/JIOT.2016.2579198
P. Mach, Z. Becvar, Mobile Edge Computing: A Survey on Architecture and Computation Offloading, arXiv preprint arXiv:1702.05309.
Errabelly, 2017, Edgesec: design of an edge layer security service to enhance internet of things security
Montero, 2016, Offloading personal security applications to the network edge: a mobile user case scenario
Hsu, 2018, Reconfigurable security: edge-computing-based framework for iot, IEEE Network, 32, 92, 10.1109/MNET.2018.1700284
Tao, 2017, Performance guaranteed computation offloading for mobile-edge cloud computing, IEEE Wireless Commun. Lett., 6, 774, 10.1109/LWC.2017.2740927
Hu, 2014, Flowguard: building robust firewalls for software-defined networks
Roman, 2018, Immune system for the internet of things using edge technologies, IEEE Internet. Things J., 1
Haddadi, 2018, Siotome: an edge-isp collaborative architecture for iot security
Ali, 2018, Edge-centric multimodal authentication system using encrypted biometric templates, Future Gener. Comput. Syst., 85, 76, 10.1016/j.future.2018.02.040
Lu, 2017, A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced iot, IEEE Access, 5, 3302, 10.1109/ACCESS.2017.2677520
Du, 2018, Big data privacy preserving in multi-access edge computing for heterogeneous internet of things, IEEE Commun. Mag., 56, 62, 10.1109/MCOM.2018.1701148
Singh, 2017, Rt-sane: real time security aware scheduling on the network edge
Portal
Lin, 2017, On data integrity attacks against route guidance in transportation-based cyber-physical systems
Singh, 2014, A survey of internet-of-things: future vision, architecture, challenges and services
Chen, 2016, Efficient multi-user computation offloading for mobile-edge cloud computing, IEEE/ACM Trans. Netw., 2795, 10.1109/TNET.2015.2487344
Lee, 2015, The internet of things (iot): applications, investments, and challenges for enterprises, Bus. Horiz., 58, 431, 10.1016/j.bushor.2015.03.008
Sha, 2017, A secure and efficient framework to read isolated smart grid devices, IEEE Trans. on Smart Grid, 8, 2519, 10.1109/TSG.2016.2526045
Montero, 2015, Virtualized security at the network edge: a user-centric approach, IEEE Commun. Mag., 53, 176, 10.1109/MCOM.2015.7081092
Mukherjee, 2017, Calyam End-to-end iot security middleware for cloud-fog communication
project
Basile, 2010, Ontology-based security policy translation, J. Inf. Assur. Secur., 5, 437
Goldman, 2006, Linking remote attestation to secure tunnel endpoints
Markham, 2001, Security at the network edge: a distributed firewall architecture
Kazemian, 2012, Header space analysis: static checking for networks
Reitblatt, 2012, Abstractions for network update, Comput. Commun. Rev., 42, 323, 10.1145/2377677.2377748
Yaseen, 2016, A fog computing based system for selective forwarding detection in mobile wireless sensor networks
Nunes, 2013, Virtualized network isolation using software defined networks
Wilhoit
Kolias, 2017, Ddos in the iot: mirai and other botnets, Computer, 50, 80, 10.1109/MC.2017.201
Dasgupta, 2017, Multi-factor authentication, 185
Sha, 2014, One-time symmetric key based cloud supported secure smart meter reading
Fan, 2012, Eslras: a lightweight rfid authentication scheme with high efficiency and strong security for internet of things
Gope, 2018, Lightweight and privacy-preserving rfid authentication scheme for distributed iot infrastructure with secure localization services for smart city environment, Future Gener. Comput. Syst., 83, 629, 10.1016/j.future.2017.06.023
Dwork, 2014, The algorithmic foundations of differential privacy, Found. Trends® Theor. Comput. Sci., 9, 211
Sweeney, 2002, A model for protecting privacy, Int. J. Uncertain. Fuzziness Knowledge-Based Syst., 10, 557, 10.1142/S0218488502001648
Xi, 2007, Enforcing privacy using symmetric key-set in vehicular networks
Sha, 2006, Adaptive privacy-preserving authentication in vehicular networks
Gentry, 2009
Pei, 1996
McSherry, 2007, Mechanism design via differential privacy
Razeghi, 2018, Privacy-preserving outsourced media search using secure sparse ternary codes
Sharma, 2017, Privategraph: a cloud-centric system for spectral analysis of large encrypted graphs
Loheswaran, 2016, Renaissance system model improving security and third party auditing in cloud computing, Wirel. Pers. Commun., 90, 1051, 10.1007/s11277-016-3296-7
Sommer, 2010, Outside the closed world: on using machine learning for network intrusion detection, 305
Buczak, 2016, A survey of data mining and machine learning methods for cyber security intrusion detection, IEEE Commun. Surv. Tutor., 18, 1153, 10.1109/COMST.2015.2494502
Yin, 2017, A deep learning approach for intrusion detection using recurrent neural networks, Ieee Access, 5, 21954, 10.1109/ACCESS.2017.2762418
Shone, 2018, A deep learning approach to network intrusion detection, IEEE Trans. Emerg. Top. Comput. Intell., 2, 41, 10.1109/TETCI.2017.2772792
Sha, 2015, Data quality challenges in cyber-physical systems, J. Data Inf. Qual. (JDIQ), 6, 8
Sha, 2010, Rd4: role-differentiated cooperative deceptive data detection and filtering in vanets, IEEE Trans. Veh. Technol., 59, 1183, 10.1109/TVT.2010.2040400
Weber, 2016, Cybersecurity in the internet of things: legal aspects, Comput. Law Secur. Rep., 32, 715, 10.1016/j.clsr.2016.07.002
Sha, 2017, Patient identification based on wrist activity data
Tsai, 2012, Threat as a service?: virtualization’s impact on cloud security, IT professional, 14, 32, 10.1109/MITP.2011.117
Eldefrawy, 2017, Fusing hybrid remote attestation with a formally verified microkernel: lessons learned