Landscape of IoT security
Tài liệu tham khảo
Schwab, 2016
Gou, 2013, Construction and strategies in IoT security system, 1129
Pacheco, 2017, IoT security framework for smart water system, 1285
Vega, 2020
Maayan, 2020
van der Meulen, 2017
Liu, 2020
Sicari, 2015, Security, privacy and trust in internet of things: The road ahead, Elsevier Comput. Netw., 76, 146, 10.1016/j.comnet.2014.11.008
Romkey, 2017, Toast of the IoT: The 1990 interop internet toaster, IEEE Consum. Electron. Mag., 6, 116, 10.1109/MCE.2016.2614740
Rajaraman, 2017, Radio frequency identification, Resonance, 22, 549, 10.1007/s12045-017-0498-6
Suresh, 2014, A state of the art review on the internet of things (IoT) history, technology and fields of deployment, 1
Mark Patel, 2017
2020
Sisinni, 2018, Industrial internet of things: Challenges, opportunities, and directions, IEEE Trans. Ind. Inf., 14, 4724, 10.1109/TII.2018.2852491
Gatouillat, 2018, Internet of medical things: A review of recent contributions dealing with cyber-physical systems in medicine, IEEE Internet Things J., 5, 3810, 10.1109/JIOT.2018.2849014
2020
Mukherjee, 2015, An official American thoracic society statement: The importance of healthy sleep, ATSJ. Am. J. Respir. Crit. Care Med., 191, 1450, 10.1164/rccm.201504-0767ST
Tsai, 2010, Physical activity and optimal self-rated health of adults with and without diabetes, BMC Public Health, 10, 365, 10.1186/1471-2458-10-365
Bharadwaj, 2019
Arasteh, 2016, Iot-based smart cities: A survey, 1
Horwitz, 2020
Manyika, 2013
Alaa, 2017, A review of smart home applications based on Internet of Things, J. Netw. Comput. Appl., 97, 48, 10.1016/j.jnca.2017.08.017
Voydock, 1983, Security mechanisms in high-level network protocols, ACM Comput. Surv., 15, 135, 10.1145/356909.356913
Federrath, 2000, Gliederung und systematisierung von schutzzielen in IT-systemen, Springer Datenschutz Datensicherheit (DuD), 24, 704
Laudon, 2015
Do, 2019, The role of the adversary model in applied security research, Comput. Secur., 81, 156, 10.1016/j.cose.2018.12.002
Ngo, 2020, A survey of IoT malware and detection methods based on static features, ICT Express, 6, 280, 10.1016/j.icte.2020.04.005
Shirley, 2000
Evans, 2002
Grant, 2014
2020
Cilfone, 2019, Wireless mesh networking: An IoT-oriented perspective survey on relevant technologies, MDPI Future Internet, 11, 99, 10.3390/fi11040099
Lin, 2016, The development of IC packaging under the Internet of Things standards, 209
Devalal, 2018, LoRa technology - An overview, 284
Ebi, 2019, Synchronous LoRa mesh network to monitor processes in underground infrastructure, IEEE Access, 7, 57663, 10.1109/ACCESS.2019.2913985
Stiller, 2021, An overview of network communication technologies for IoT
Shelby, 2009
Kushalnagar, 2007, 1
Kim, 2012, 1
Shelby, 2012, 1
Chakrabarti, 2017, 1
Thubert, 2016, 1
Kothmayr, 2013, DTLS based security and two-way authentication for the Internet of Things, Ad Hoc Netw., 11, 2710, 10.1016/j.adhoc.2013.05.003
2011
Bormann, 2012, CoAP: An application protocol for billions of tiny internet nodes, IEEE Internet Comput., 16, 62, 10.1109/MIC.2012.29
Tamboli, 2016, Secure and efficient CoAP based authentication and access control for Internet of Things (IoT), 1245
Arvind, 2019, An overview of security in CoAP: Attack and analysis, 655
Yassein, 2016, Application layer protocols for the Internet of Things: A survey, 1
Suciu, 2019, Secure smart agriculture monitoring technique through isolation, 1
Li, 2017, Security architecture in the internet of things, 27
Sethi, 2017, Internet of things: Architectures, protocols, and applications, Hindawi J. Electr. Comput. Eng., 2017
Noor, 2019, Current research on internet of things (IoT) security: A survey, Elsevier Comput. Netw., 148, 283, 10.1016/j.comnet.2018.11.025
Bujari, 2018, Standards, security and business models: Key challenges for the IoT scenario, Mob. Netw. Appl., 23, 147, 10.1007/s11036-017-0835-8
Zhang, 2019, The current research of IoT security, 346
Stallings, 2015, The internet of things: Network and security architecture, Internet Soc.: Internet Protocol J., 18, 2
Zhang, 2018, Security and trust issues in fog computing: A survey, Elsevier Future Gener. Comput. Syst., 88, 16, 10.1016/j.future.2018.05.008
Kolias, 2017, DDos in the IoT: Mirai and other botnets, IEEE Comput., 50, 80, 10.1109/MC.2017.201
2021
Jordan Robertson, 2014
Stevens, 2018, Cyberweapons: Power and the governance of the invisible, Springer Int. Politics, 55, 482, 10.1057/s41311-017-0088-y
Singh, 2015, Internet of things (IoT): Security challenges, business opportunities & reference architecture for E-commerce, 1577
Kolias, 2015, Securely making things right, IEEE Comput., 48, 84, 10.1109/MC.2015.258
Babar, 2010, Proposed security model and threat taxonomy for the internet of things (IoT), 420
O. Garcia-Morchon, S. Kumar, M. Sethi, Internet of Things (IoT) Security: State of the Art and Challenges, Internet Research Task Force (IRTF), no. 8576, 2019, pp. 1–50, [Online]. Available:.
Bastos, 2018, GDPR privacy implications for the internet of things
2020
Drolet, 2018
2018
Notra, 2014, An experimental study of security and privacy risks with emerging household appliances, 79
Minoli, 2017, IoT security (IoTsec) considerations, requirements, and architectures, 1006
Zarpelão, 2017, A survey of intrusion detection in internet of things, Elsevier J. Netw. Comput. Appl., 84, 25, 10.1016/j.jnca.2017.02.009
Jonsdottir, 2017, IoT network monitor, 1
Nam, 2020, Recurrent gans password cracker for iot password security enhancement, Sensors, 20, 3106, 10.3390/s20113106
Hellaoui, 2017, Energy-efficient mechanisms in security of the internet of things: A survey, Elsevier Comput. Netw., 127, 173, 10.1016/j.comnet.2017.08.006
Bormann, 2014, 1
Das, 2018, Taxonomy and analysis of security protocols for internet of things, Elsevier Future Gener. Comput. Syst., 89, 110, 10.1016/j.future.2018.06.027
Alqassem, 2014, A taxonomy of security and privacy requirements for the internet of things (IoT), 1244
Roman, 2013, On the features and challenges of security and privacy in distributed internet of things, Elsevier Comput. Netw., 57, 2266, 10.1016/j.comnet.2012.12.018
Tweneboah-Koduah, 2017, Cyber security threats to IoT applications and service domains, Springer Wirel. Personal Commun., 95, 169, 10.1007/s11277-017-4434-6
Nawir, 2016, Internet of things (IoT): Taxonomy of security attacks, 321
Stewart, 2020, Explain the difference between identification and authentication (identity proofing)
Zhou, 2017, Security and privacy for cloud-based IoT: Challenges, IEEE Commun. Mag., 55, 26, 10.1109/MCOM.2017.1600363CM
Martin, 2020, Towards a formal IoT security model, MDPI Symmetry, 12, 1
El-Hajj, 2019, A survey of internet of things (IoT) authentication schemes, Sensors, 19, 1141, 10.3390/s19051141
Kim, 2017, Authentication and authorization for the internet of things, IT Prof., 19, 27, 10.1109/MITP.2017.3680960
Scarfone, 2018, Confidentiality, integrity, and availability - archive of obsolete content — MDN
Lu, 2019, Internet of things (IoT) cybersecurity research: A review of current research topics, IEEE Internet Things J., 6, 2103, 10.1109/JIOT.2018.2869847
2020
Pokorni, 2019, Reliability and availability of the internet of things, Minist. Def. Serb. Armed Forces: Vojnoteh. Glas. / Mil. Tech. Cour., 67, 588
Onieva, 2008, Multiparty nonrepudiation: A survey, ACM Comput. Surv., 41, 10.1145/1456650.1456655
Pacheco, 2016, IoT security framework for smart cyber infrastructures, 242
Kimani, 2019, Cyber security challenges for IoT-based smart grid networks, Elsevier Int. J. Crit. Infrastruct. Prot., 25, 36, 10.1016/j.ijcip.2019.01.001
Sidhu, 2019, Hardware security in IoT devices with emphasis on hardware Trojans, J. Sensor Actuator Netw., 8, 42, 10.3390/jsan8030042
Schläpfer, 2019, Security on IoT devices with secure elements
Niya, 2020, BIIT: Standardization of blockchain-based I2ot systems in the I4 era, 1
Rafati Niya, 2021, Architectures for blockchain-IoT integration, Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning, 321
Pinto, 2019, Demystifying arm TrustZone: A comprehensive survey, ACM Comput. Surv., 51, 10.1145/3291047
Enns, 2011
Bjorklund, 2010
Fielding, 2000
Silva, 2019, M4DN.IoT-A networks and devices management platform for internet of things, IEEE Access, 7, 53305, 10.1109/ACCESS.2019.2909436
T. Scheffler, O. Bonneß, Manage resource-constrained IoT devices through dynamically generated and deployed YANG models, in: Proceedings of the Applied Networking Research Workshop, 2017, pp. 42–47.
Karim, 2019, An OpenID based authentication service mechanisms for internet of things, 687
Shang, 2016, Challenges in IoT networking via TCP/IP architecture, NDN Proj.
Sporny, 2022
Sporny, 2022
Windley, 2019, Multisource digital identity, IEEE Internet Comput., 23, 8, 10.1109/MIC.2019.2940222
Dunphy, 2018, A first look at identity management schemes on the blockchain, IEEE Secur. Priv., 16, 20, 10.1109/MSP.2018.3111247
2018
Zervaki, 2020
2020
Stoyanova, 2020, A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues, IEEE Commun. Surv. Tutor., 22, 1191, 10.1109/COMST.2019.2962586
Oriwoh, 2013, Internet of things forensics: Challenges and approaches, 608
Hou, 2020, A survey on digital forensics in internet of things, IEEE Internet Things J., 7, 1, 10.1109/JIOT.2019.2940713
Zawoad, 2015, FAIoT: Towards building a forensics aware eco system for the internet of things, 279
Sadineni, 2019, A holistic forensic model for the internet of things, 3
Hossain, 2018
Chung, 2017, Digital forensic approaches for Amazon Alexa ecosystem, Digit. Investig., 22, 15, 10.1016/j.diin.2017.06.010
Al-Sharrah, 2018, Watch your smartwatch, 1
Symington, 2020
Malik, 2019, A survey of key bootstrapping protocols based on public key cryptography in the internet of things, IEEE Access, 7, 27443, 10.1109/ACCESS.2019.2900957
2020
2020
2020
2020
2020
2020
Lear, 2019
Su, 2019
2020
2020
Alhowaide, 2021, Ensemble detection model for IoT IDS, Internet Things, 16, 10.1016/j.iot.2021.100435
2020
2020
2020
2020
2020
2020
2020
2020
2020
2020
Tankovska, 2020
2020
2020
2017
2020
2020, Vulnerability metrics
2019, Vulnerabilities by type