CAAVI-RICS model for observing the security of distributed IoT and edge computing systems
Tài liệu tham khảo
Aircrack-NG, Openwips-ng, 2018, (https://www.github.com/aircrack-ng/OpenWIPS-ng).
Aman, 2018, Low power data integrity in IoT systems, IEEE Internet Things J., 5, 3102, 10.1109/JIOT.2018.2833206
Andersen, 2017
Babar, 2010, Proposed security model and threat taxonomy for the Internet of Things (IoT), 420
Barik, 2016, Foggis: fog computing for geospatial big data analytics, 613
Burks, 2012
Carter, 2006
Chiang, 2016, Fog and IoT: an overview of research opportunities, IEEE Internet Things J., 3, 854, 10.1109/JIOT.2016.2584538
Cirani, 2013, Enforcing security mechanisms in the ip-based internet of things: an algorithmic overview, Algorithms, 6, 197, 10.3390/a6020197
Dorri, 2017, Blockchain for IoT security and privacy: the case study of a smart home, 618
Dsouza, 2014, Policy-driven security management for fog computing: Preliminary framework and a case study, 16
Fernandes, 2016, Flowfence: Practical data protection for emerging iot application frameworks, 531
Ganeriwal, 2008, Reputation-based framework for high integrity sensor networks, ACM Trans. Sensor Netw., 4, 1, 10.1145/1362542.1362546
Güneysu, 2017, Towards lightweight identity-based encryption for the post-quantum-secure Internet of Things, 319
Guo, 2017, A survey of trust computation models for service management in internet of things systems, Comput. Commun., 97, 1, 10.1016/j.comcom.2016.10.012
He, 2014, An enhanced public key infrastructure to secure smart grid wireless communication networks, IEEE Netw., 28, 10, 10.1109/MNET.2014.6724101
Hodo, 2016, Threat analysis of IoT networks using artificial neural network intrusion detection system, 1
Huang, 2017, Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things, IEEE Access, 5, 12941, 10.1109/ACCESS.2017.2727054
Huang, 2010, A generic framework for three-factor authentication: preserving security and privacy in distributed systems, IEEE Trans. Parallel Distrib. Syst., 22, 1390, 10.1109/TPDS.2010.206
Hummen, 2014, Delegation-based authentication and authorization for the ip-based Internet of Things, 284
Ibrahim, 2016, Octopus: an edge-fog mutual authentication scheme., IJ Netw. Secur., 18, 1089
Index, 2018, 1
Joye, 2009, volume 2
Khan, 2017, Fog computing security: a review of current applications and security solutions, J. Cloud Comput., 6, 19, 10.1186/s13677-017-0090-3
Kim, 2017, A toolkit for construction of authorization service infrastructure for the internet of things, 147
Kumar, 2016, Fog computing: Common security issues and proposed countermeasures, 311
Lalitha, 2018, Recover the missing data in IoT by edge analytics, I-Manager’s J. Softw. Eng., 13, 25, 10.26634/jse.13.2.14342
Law, 2013, Wake: key management scheme for wide-area measurement systems in smart grid, IEEE Commun. Mag., 51, 34, 10.1109/MCOM.2013.6400436
Lei, 2017, Blockchain-based dynamic key management for heterogeneous intelligent transportation systems, IEEE Internet Things J., 4, 1832, 10.1109/JIOT.2017.2740569
Li, 2017, Lightweight mutual authentication for IoT and its applications, IEEE Trans. Sustain. Comput., 2, 359, 10.1109/TSUSC.2017.2716953
Li, 2017, An IoT data communication framework for authenticity and integrity, 159
Liu, 2017, Blockchain based data integrity service framework for IoT data, 468
Liu, 2014, Maca: A privacy-preserving multi-factor cloud authentication system utilizing big data, 518
Mahmoud, 2015, Internet of things (IoT) security: Current status, challenges and prospective measures, 336
A. Manzoor, A. Wahid, M.A. Shah, A. Akhunzada, F.F. Qureshi, Secure login using multi-tier authentication schemes in fog computing (2018).
Marforio, 2014, Smartphones as practical and secure location verification tokens for payments., vol.14, 23
Matsemela, 2017, Internet of things data integrity, 1
Misra, 2009, Laid: a learning automata-based scheme for intrusion detection in wireless sensor networks, Secur. Commun. Netw., 2, 105, 10.1002/sec.74
Misra, 2016, Design and implementation analysis of a public key infrastructure-enabled security framework for zigbee sensor networks, Int. J. Commun. Syst., 29, 1992, 10.1002/dac.2893
Moore, 2008, Fast exclusion of errant devices from vehicular networks, 135
Moradi, 2011, Pushing the limits: A very compact and a threshold implementation of aes, 69
Nitti, 2012, A subjective model for trustworthiness evaluation in the social internet of things, 18
Noroozi, 2018, Vpkiaas: A highly-available and dynamically-scalable vehicular public-key infrastructure, 302
Noura, 2018, One round cipher algorithm for multimedia IoT devices, Multimed. Tools Appl., 77, 18383, 10.1007/s11042-018-5660-y
Osvik, 2010, Fast software aes encryption, 75
Pešić, 2019, CAAVI-RICS model for analyzing the security of fog computing systems
Pešić, 2019, Caavi-rics model for analyzing the security of fog computing systems, 23
Pesic, 2019, Caavi-rics model for analyzing the security of fog computing systems: Authentication, 226
Razouk, 2017, A new security middleware architecture based on fog computing and cloud to support IoT constrained devices, 35
Rijswijk-Deij, 2013, Using trusted execution environments in two-factor authentication: comparing approaches
Roesch, 1999, Snort: Lightweight intrusion detection for networks., vol. 99, 229
Rosenfeld, 2010, Sensor physical unclonable functions, 112
Roux, 2017, Toward an intrusion detection approach for IoT based on radio communications profiling, 147
Salonikias, 2015, Access control issues in utilizing fog computing for transport infrastructure, 15
Samarati, 2000, Access control: Policies, models, and mechanisms, 137
Sedjelmaci, 2013, Efficient and lightweight intrusion detection based on nodes’ behaviors in wireless sensor networks, 1
Sedjelmaci, 2016, A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology, 1
Seitz, 2015, Authorization for the internet of things using oauth 2.0
Seitz, 2017
Shahzad, 2017, Continuous authentication and authorization for the internet of things, IEEE Internet Comput., 21, 86, 10.1109/MIC.2017.33
Shivraj, 2015, One time password authentication scheme based on elliptic curves for Internet of Things (IoT), 1
Singh, 2017, Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions, J. Ambient Intell. Hum. Comput., 1
Srivatsa, 2011, Eventguard: a system architecture for securing publish-subscribe networks, ACM Trans. Comput. Syst., 29, 1, 10.1145/2063509.2063510
Stojmenovic, 2014, The fog computing paradigm: scenarios and security issues, 1
Stojmenovic, 2016, An overview of fog computing and its security issues, Concurr. Comput., 28, 2991, 10.1002/cpe.3485
Suciu, 2015, Big data, internet of things and cloud convergence–an architecture for secure e-health applications, J. Med. Syst., 39, 141, 10.1007/s10916-015-0327-y
Tian, 2017, Smartauth: user-centered authorization for the internet of things, 361
Trnka, 2018, Authentication and authorization rules sharing for internet of things, Softw. Netw., 2018, 35
Tsai, 2009, Intrusion detection by machine learning: a review, Expert Syst. Appl., 36, 11994, 10.1016/j.eswa.2009.05.029
Tsai, 2013, Data mining for internet of things: a survey, IEEE Commun. Surv. Tut., 16, 77, 10.1109/SURV.2013.103013.00206
Turkanović, 2014, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion, Ad Hoc Netw., 20, 96, 10.1016/j.adhoc.2014.03.009
Usman, 2017, Sit: a lightweight encryption algorithm for secure internet of things, arXiv preprint arXiv:1704.08688
Valenta, 2017
Wang, 2018, Fear and logging in the Internet of Things
Wang, 2016, Reusing hardware performance counters to detect and identify kernel control-flow modifying rootkits, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 35, 485, 10.1109/TCAD.2015.2474374
Wang, 2015, Confirm: Detecting firmware modifications in embedded systems using hardware performance counters, 544
Wong, 2017, Enhancing suricata intrusion detection system for cyber security in scada networks, 1
Wu, 2017, An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment, J. Netw. Comput. Appl., 89, 72, 10.1016/j.jnca.2016.12.008
Xiao, 2017, A hybrid scheme for fine-grained search and access authorization in fog computing environment, Sensors, 17, 1423, 10.3390/s17061423
Ye, 2014, An efficient authentication and access control scheme for perception layer of internet of things, Appl., Math. Inf. Sci., 8, 1617, 10.12785/amis/080416
Yi, 2015, Security and privacy issues of fog computing: A survey, 685