Security, privacy and trust in Internet of Things: The road ahead
Tóm tắt
Từ khóa
Tài liệu tham khảo
Atzori, 2010, The internet of things: a survey, Comput. Netw., 54, 2787, 10.1016/j.comnet.2010.05.010
Miorandi, 2012, Survey internet of things: vision, applications and research challenges, Ad Hoc Netw., 10, 1497, 10.1016/j.adhoc.2012.02.016
Palattella, 2013, Standardized protocol stack for the internet of (important) things, IEEE Commun. Surv. Tutorials, 15, 1389, 10.1109/SURV.2012.111412.00158
Emmerson, 2010, M2M: the internet of 50 billion devices, Huawei Win–Win Mag. J., 19
Boswarthick, 2012
Hersent, 2012
L.A. Grieco, M.B. Alaya, T. Monteil, K.K. Drira, Architecting information centric ETSI-M2M systems, in: IEEE PerCom, 2014.
Weber, 2010, Internet of things - new security and privacy challenges, Comput. Law Secur. Rev., 26, 23, 10.1016/j.clsr.2009.11.008
H. Feng, W. Fu, Study of recent development about privacy and security of the internet of things, in: 2010 International Conference on Web Information Systems and Mining (WISM), Sanya, 2010, pp. 91–95.
Roman, 2013, On the features and challenges of security and privacy in distributed internet of things, Comput. Networks, 57, 2266, 10.1016/j.comnet.2012.12.018
J. Anderson, L. Rainie, The Internet of Things will Thrive by 2025, PewResearch Internet Project, May 2014. <http://www.pewinternet.org/2014/05/14/internet-of-things/>.
S. Bandyopadhyay, M. Sengupta, S. Maiti, S. Dutta, A survey of middleware for internet of things, in: Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey, 2011, pp. 288–296.
M.A. Chaqfeh, N. Mohamed, Challenges in middleware solutions for the internet of things, in: 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, 2012, pp. 21–26.
S. Babar, A. Stango, N. Prasad, J. Sen, R. Prasad, Proposed embedded security framework for internet of things (iot), in: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, Chennai, India, 2011, pp. 1 – 5.
Domingo, 2012, An overview of the internet of underwater things, J. Network Comput. Appl., 35, 1879, 10.1016/j.jnca.2012.07.012
Gubbi, 2013, Internet of Things (IoT): a vision, architectural elements, and future directions, Future Gener. Comput. Syst., 29, 1645, 10.1016/j.future.2013.01.010
Yan, 2014, A survey on trust management for internet of things, J. Network Comput. Appl., 42, 120, 10.1016/j.jnca.2014.01.014
Y. Zhao, Research on data security technology in internet of things, in: 2013 2nd International Conference on Mechatronics and Control Engineering, ICMCE 2013, Dalian, China, 2013, pp. 1752–1755.
Kothmayr, 2013, Dtls based security and two-way authentication for the internet of things, Ad Hoc Netw., 11, 2710, 10.1016/j.adhoc.2013.05.003
Roman, 2011, Key management systems for sensor networks in the context of the internet of things, Comput. Electrical Eng., 37, 147, 10.1016/j.compeleceng.2011.01.009
Du, 2005, A pairwise key predistribution scheme for wireless sensor networks, ACM Trans. Inf. Syst. Secur. (TISSEC), 8, 228, 10.1145/1065545.1065548
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: CCS ’03 Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003, pp. 52–61.
H. Pranata, R. Athauda, G. Skinner, Securing and governing access in ad-hoc networks of internet of things, in: Proceedings of the IASTED International Conference on Engineering and Applied Science, EAS 2012, Colombo, Sri Lanka, 2012, pp. 84–90.
Ning, 2013, A security framework for the internet of things based on public key infrastructure, Adv. Mater. Res., 671–674, 3223
Wu, 2011, A security transmission model for internet of things, Jisuanji Xuebao/Chin. J. Comput., 34, 1351
G. Piro, G. Boggia, L.A. Grieco, A standard compliant security framework for ieee 802.15.4 networks, in: Proc. of IEEE World Forum on Internet of Things (WF-IoT), Seoul, South Korea, 2014, pp. 27–30.
Chan, 2003, Security and privacy in sensor networks, IEEE Commun. Mag., 36, 103, 10.1109/MC.2003.1236475
Li, 2009, Privacy preservation in wireless sensor networks: a state-of-the-art survey, Ad Hoc Netw., 7, 1501, 10.1016/j.adhoc.2009.04.009
Zhang, 2010, Security and privacy in sensor networks, J. Network Comput. Appl., 33, 63, 10.1016/j.jnca.2009.10.001
G.Sharmam, S. Bala, A.K. Verma, Security frameworks for wireless sensor networks-review, in: 2nd International Conference on Communication, Computing & Security, ICCCS-2012, 2012, pp. 978–987.
J.-Y. Lee, W.-C. Lin, Y.-H. Huang, A lightweight authentication protocol for internet of things, in: 2014 International Symposium on Next-Generation Electronics, ISNE 2014, Kwei-Shan, 2014, pp. 1–2.
Turkanovi, 2014, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion, Ad Hoc Netw., 20, 96, 10.1016/j.adhoc.2014.03.009
Ye, 2014, An efficient authentication and access control scheme for perception layer of internet of things, Appl. Math. Inf. Sci., 8, 1617, 10.12785/amis/080416
Alcaide, 2013, Anonymous authentication for privacy-preserving iot target-driven applications, Comput. Secur., 37, 111, 10.1016/j.cose.2013.05.007
Ma, 2013, A hierarchical access control scheme for perceptual layer of iot, Jisuanji Yanjiu yu Fazhan/Comput. Res. Dev., 50, 1267
C. Hu, J. Zhang, Q. Wen, An identity-based personal location system with protected privacy in IoT, in: Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011, Shenzhen, China, 2011, pp. 192–195.
M. Ali, M. ElTabakh, C. Nita-Rotaru, FT-RC4: A Robust Security Mechanism for Data Stream Systems, Tech. Rep. TR-05-024, Purdue University (November 2005).
M.A. Hammad, M.J. Franklin, W. Aref, A.K. Elmagarmid, Scheduling for shared window joins over data streams, in: Proceedings of the 29th International Conference on Very Large Data Bases, VLDB ’03, Berlin, Germany, 2003, pp. 297–308.
S. Papadopoulos, Y. Yang, D. Papadias, Cads: continuous authentication on data streams, in: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB ’07, Vienna, Austria, 2007, pp. 135–146.
Papadopoulos, 2010, Continuous authentication on relational data streams, VLDB J., 19, 161, 10.1007/s00778-009-0145-2
S. Papadopoulos, G. Cormode, A. Deligiannakis, M. Garofalakis, Lightweight authentication of linear algebraic queries on data streams, in: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, SIGMOD’13, New York, USA, 2013, pp. 881–892.
W. Lindner, J. Meier, User interactive internet of things privacy preserved access control, in: 10th International Database Engineering and Applications Symposium, 2006, IDEAS’06, Delhi, 2006, pp. 137–147.
D.J. Abadi, Y. Ahmad, M. Balazinska, M. Cherniack, J. Hwang, W. Lindner, A.S. Maskey, E. Rasin, E. Ryvkina, N. Tatbul, Y. Xing, S. Zdonik, The design of the borealis stream processing engine, in: CIDR, 2005, pp. 277–289.
R. Nehme, E. Rundesteiner, E. Bertino, A security punctuation framework for enforcing access control on streaming data, in: Proceedings of the 24th International Conference on Data Engineering, ICDE ’08, Cancun, Mexico, 2008, pp. 406–415.
Nehme, 2009, Tagging stream data for rich real-time services, Proc. VLDB Endowment, 2, 73, 10.14778/1687627.1687637
Y. Zhu, E.A. Rundensteiner, G.T. Heineman, Dynamic plan migration for continuous queries over data streams, in: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD ’04, Paris, France, 2004, pp. 431–442.
B. Carminati, E. Ferrari, K.L. Tan, Enforcing access control over data streams, in: Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT ’07, Sophia Antipolis, France, 2007, pp. 21–30.
B. Carminati, E. Ferrari, K.L. Tan, Specifying access control policies on data streams, in: Proceedings of the Database System for Advanced Applications Conference, DASFAA 2007, Bangkok, Thailand, 2007, pp. 410–421.
Abadi, 2003, Aurora: a new model and architecture for data stream management, VLDB J., 12, 120, 10.1007/s00778-003-0095-z
Carminati, 2010, A framework to enforce access control over data streams, ACM Trans. Inform. Syst. Sec. TISSEC, 13, 1, 10.1145/1805974.1805984
Gusmeroli, 2013, A capability-based security approach to manage access control in the internet of things, Math. Comput. Model., 58, 1189, 10.1016/j.mcm.2013.02.006
European FP7 IoT@Work project. <http://iot-at-work.eu>.
Mahalle, 2010, Identity management framework towards internet of things (IoT): Roadmap and key challenges, Commun. Comput. Inf. Sci., 89, 430, 10.1007/978-3-642-14478-3_43
A. Cherkaoui, L. Bossuet, L. Seitz, G. Selander, R. Borgaonkar, New paradigms for access control in constrained environments, in: 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Montpellier, 2014, pp. 1–4.
Veltri, 2013, A novel batch-based group key management protocol applied to the internet of things, Ad Hoc Netw., 11, 2724, 10.1016/j.adhoc.2013.05.009
S. Sicari, A. Rizzardi, C. Cappiello, A. Coen-Porisini, A NFP model for internet of things applications, in: Proc. of IEEE WiMob, Larnaca, Cyprus, 2014, pp. 164–171.
D. Evans, D. Eyers, Efficient data tagging for managing privacy in the internet of things, in: Proceedings – 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CPSCom 2012, Besancon, France, 2012, pp. 244–248.
X. Huang, R. Fu, B. Chen, T. Zhang, A. Roscoe, User interactive internet of things privacy preserved access control, in: 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, 2012, pp. 597–602.
Cao, 2011, CASTLE: continuously anonymizing data streams, IEEE Trans. Dependable Secure Comput., 8, 337, 10.1109/TDSC.2009.47
Yang, 2011, Security model and key technologies for the internet of things, J. China Universities Posts Telecommun., 8, 109, 10.1016/S1005-8885(10)60159-8
Y. Wang, Q. Wen, A privacy enhanced dns scheme for the internet of things, in: IET International Conference on Communication Technology and Application, ICCTA 2011, Beijing, China, 2011, pp. 699–702.
X. Wang, J. Zhang, E. Schooler, M. Ion, Performance evaluation of attribute-based encryption: Toward data privacy in the IoT, in: 2014 IEEE International Conference on Communications, ICC 2014, Sydney, NSW, 2014, pp. 725–730.
Su, 2014, ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things, Future Gener. Comput. Syst., 33, 11, 10.1016/j.future.2013.10.016
Peng, 2014, Privacy protection based on key-changed mutual authentication protocol in internet of things, Commun. Comput. Inf. Sci., 418 CCIS, 345, 10.1007/978-3-642-54522-1_34
A. Ukil, S. Bandyopadhyay, A. Pal, Iot-privacy: To be private or not to be private, in: Proceedings – IEEE INFOCOM, Toronto, ON, 2014, pp. 123–124.
Sicari, 2014, A security-and quality-aware system architecture for internet of things, Inf. Syst. Frontiers, 1
F. Bao, I. Chen, Dynamic trust management for internet of things applications, in: Proceedings of the 2012 International Workshop on Self-Aware Internet of Things, Self-IoT ’12, USA, San Jose, 2012, pp. 1–6.
F. Bao, I. Chen, Trust management for the internet of things and its application to service composition, in: 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, United States, 2012, pp. 1–6.
M. Nitti, R. Girau, L. Atzori, A. Iera, G. Morabito, A subjective model for trustworthiness evaluation in the social internet of things, in: 2012 IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC, Australia, Sydney, 2012, pp. 18–23.
S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigen-trust algorithm for reputation management in p2p networks, in: Proc. WWW’03, New York, USA, 2003, pp. 640–651.
Xiong, 2004, Peertrust: supporting reputation-based trust for peer-to-peer electronic communities, IEEE Trans. Knowl. Data Eng., 16, 843, 10.1109/TKDE.2004.1318566
A.A. Selcuk, E. Uzun, M.R. Pariente, A reputation-based trust management system for p2p networks, in: Proc. of CCGRID 2004, Washington, DC, USA, 2004, pp. 251–258.
B. Yu, M.P. Singh, K. Sycara, Developing trust in large-scale peer-to-peer systems, in: Proc. of First IEEE Symposium on Multi-Agent Security and Survivability, 2004, pp. 1–10.
Liang, 2005, Enforcing cooperative resource sharing in untrusted p2p computing environments, Mob. Netw. Appl., 10, 251, 10.1007/s11036-005-4453-5
Lacuesta, 2012, Internet of things: where to be is to trust, EURASIP J. Wireless Commun. Networking, 2012, 1, 10.1186/1687-1499-2012-203
P.N. Mahalle, P.A. Thakre, N.R. Prasad, R. Prasad, A fuzzy approach to trust based access control in internet of things, in: 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, VITAE, NJ, Atlantic City, 2013, pp. 1–5.
Wang, 2013, Distributed trust management mechanism for the internet of things, Appl. Mech. Mater., 347-350, 2463
Liu, 2012, An integrated scheme based on service classification in pervasive mobile services, Int. J. Commun. Syst., 25, 1178, 10.1002/dac.2330
Y. Liu, Z. Chen, F. Xia, X. Lv, F. Bu, A trust model based on service classification in mobile services, in: Proceedings – 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, Hangzhou, China, 2010, pp. 572–576.
Wen-Mao, 2012, A hierarchical trust model for the internet of things, Chin. J. Comput., 5, 846
Saied, 2013, Trust management system design for the internet of things: a context-aware and multi-service approach, Comput. Secur., 39, 351, 10.1016/j.cose.2013.09.001
Dong, 2012, Attack-resistant trust management model based on beta function for distributed routing in internet of things, China Commun., 9, 89
T. Liu, Y. Guan, Y. Yan, L. Liu, Q. Deng, A wsn-oriented key agreement protocol in internet of things, in: 3rd International Conference on Frontiers of Manufacturing Science and Measuring Technology, ICFMM 2013, LiJiang, China, 2012, pp. 1792–1795.
Martinez-Julia, 2013, Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet, Comput. Netw., 57, 2280, 10.1016/j.comnet.2012.11.020
G.D. Tormo, F.G. Marmol, G.M. Perez, Dynamic and flexible selection of a reputation mechanism for heterogeneous environments, Future Gener. Comput. Syst. (2014).
Gu, 2014, Trust management mechanism for internet of things, China Commun., 11, 148, 10.1109/CC.2014.6821746
Liu, 2014, Trust system based on node behavior detection in internet of things, Tongxin Xuebao/J. Commun., 35, 8
Macfarlane, 2012, Formal security policy implementations in network firewalls, Comput. Secur., 31, 253, 10.1016/j.cose.2011.10.003
Elrakaiby, 2012, Formal enforcement and management of obligation policies, Data Knowl. Eng., 71, 127, 10.1016/j.datak.2011.09.001
Wu, 2011, An innovative simulation environment for cross-domain policy enforcement, Simul. Model. Pract. Theory, 19, 1558, 10.1016/j.simpat.2011.03.005
Dell’Amico, 2013, Hipolds: a hierarchical security policy language for distributed systems, Inf. Secur. Technical Rep., 17, 81, 10.1016/j.istr.2012.10.002
Bella, 2011, Enforcing privacy in e-commerce by balancing anonymity and trust, Comput. Secur., 30, 705, 10.1016/j.cose.2011.08.005
Langar, 2011, Formal enforcement of security policies on concurrent systems, J. Symbol. Comput., 46, 997, 10.1016/j.jsc.2011.05.003
Baeten, 2005, A brief history of process algebra, Theoret. Comput. Sci., 335, 131, 10.1016/j.tcs.2004.07.036
Ferraiolo, 2011, The policy machine: a novel architecture and framework for access control policy specification and enforcement, J. Syst. Architec., 57, 412, 10.1016/j.sysarc.2010.04.005
D. Brewer, M. Nash, The chinese wall security policy, in: Proceedings. 1989 IEEE Symposium on Security and Privacy, Oakland, CA, 1989, pp. 206–214.
Bishop, 2003
Rao, 2009, A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources, Web Semantics: Sci. Serv. Agents World Wide Web, 7, 40, 10.1016/j.websem.2007.10.001
J. Singh, J. Bacon, D. Eyers, Policy enforcement within emerging distributed, event-based systems, in: DEBS 2014 – Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014, pp. 246–255.
R. Neisse, G. Steri, G. Baldini, Enforcement of security policy rules for the internet of things, in: Proc. of IEEE WiMob, Larnaca, Cyprus, 2014, pp. 120–127.
I. Bagci, S. Raza, T. Chung, U. Roedig, T. Voigt, Combined secure storage and communication for the internet of things, in: 2013 IEEE International Conference on Sensing, Communications and Networking, SECON 2013, New Orleans, LA, United States, 2013, pp. 523–631.
D. Conzon, T. Bolognesi, P. Brizzi, A. Lotito, R. Tomasi, M. Spirito, The virtus middleware: an xmpp based architecture for secure IoT communications, in: 2012 21st International Conference on Computer Communications and Networks, ICCCN 2012, Munich, Germany, 2012, pp. 1–6.
Gòmez-Goiri, 2014, Otsopack: lightweight semantic framework for interoperable ambient intelligence applications, Comput. Hum. Behav., 30, 460, 10.1016/j.chb.2013.06.022
M. Isa, N. Mohamed, H.H.S. Adnan, J. Manan, R. Mahmod, A lightweight and secure TFTP protocol for smart environment, in: ISCAIE 2012 – 2012 IEEE Symposium on Computer Applications and Industrial Electronics 2012, Kota Kinabalu, Malaysia, 2012, pp. 302–306.
Liu, 2013, Efficient naming, addressing and profile services in internet-of-things sensory environments, Ad Hoc Netw., 18, 85
oneM2M. <http://www.onem2m.org/>.
Colistra, 2014, The problem of task allocation in the internet of things and the consensus-based approach, Comput. Netw., 73, 98, 10.1016/j.comnet.2014.07.011
Wang, 2014, Middleware development method for internet of things, Liaoning Gongcheng Jishu Daxue Xuebao (Ziran Kexue Ban)/J. Liaoning Tech. Univ. (Nat. Sci. Ed.), 33, 675
H. Ferreira, R. De Sousa Jr., F. De Deus, E. Canedo, Proposal of a secure, deployable and transparent middleware for internet of things, in: Iberian Conference on Information Systems and Technologies, CISTI, Barcelona, 2014, pp. 1–4.
Mao, 2012, Rapid identification authentication protocol for mobile nodes in internet of things with privacy protection, J. Networks, 7, 1099
Jara, 2013, Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture, Int. J. Ad Hoc Ubiquitous Comput., 13, 228, 10.1504/IJAHUC.2013.055468
T. Yan, Q. Wen, A secure mobile rfid architecture for the internet of things, in: Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, Beijing, China, 2010, pp. 616–619.
W. Zhu, J. Yu, T. Wang, A security and privacy model for mobile rfid systems in the internet of things, in: International Conference on Communication Technology Proceedings, ICCT, 2012, pp. 726–732.
M. Elkhodr, S. Shanhrestani, H. Cheung, A review of mobile location privacy in the internet of things, in: International Conference on ICT and Knowledge Engineering, Bangkok, Thailand, 2012, pp. 266–272.
S. Li, P. Gong, Q. Yang, M. Li, J. Kong, P. Li, A secure handshake scheme for mobile-hierarchy city intelligent transportation system, in: International Conference on Ubiquitous and Future Networks, ICUFN, Da Nang, 2013, pp. 190–191.
Kang, 2013, Security and privacy mechanism for health internet of things, J. China Universities Posts Telecommun., 20, 64, 10.1016/S1005-8885(13)60219-8
F. Goncalves, J. Macedo, M. Nicolau, A. Santos, Security architecture for mobile e-health applications in medication control, in: 2013 21st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2013, Primosten, 2013, pp. 1–8.
Niu, 2014, Privacy and authentication protocol for mobile rfid systems, Wireless Pers. Commun., 77, 1713, 10.1007/s11277-014-1605-6
Jeong, 2014, An efficient and secure m-ips scheme of mobile devices for human-centric computing, J. Appl. Math. Special Issue, 2014, 1
Geng, 2014, Research on mobile information access based on internet of things, Appl. Mech. Mater., 539, 460, 10.4028/www.scientific.net/AMM.539.460
S. Kubler, K. Frmling, A. Buda, A standardized approach to deal with firewall and mobility policies in the iot, Pervasive Mobile Comput. (2014).
C. Perera, P. Jayaraman, A. Zaslavsky, D. Georgakopoulos, P. Christen, Mosden: An internet of things middleware for resource constrained mobile devices, in: Proceedings of the Annual Hawaii International Conference on System Sciences, Washington, DC, USA, 2014, pp. 1053–1062.
Montavont, 2014, Mobile {IPv6} in internet of things: analysis, experimentations and optimizations, Ad Hoc Netw., 14, 15, 10.1016/j.adhoc.2013.11.001
Rosario, 2014, A beaconless opportunistic routing based on a cross-layer approach for efficient video dissemination in mobile multimedia IoT applications, Comput. Commun., 45, 21, 10.1016/j.comcom.2014.04.002
Espada, 2014, Using extended web technologies to develop bluetooth multi-platform mobile applications for interact with smart things, Inf. Fusion, 21, 30
An, 2013, Research on social relations cognitive model of mobile nodes in internet of things, J. Network Comput. Appl., 36, 799, 10.1016/j.jnca.2012.12.004
Gronli, 2014, Towards NFC payments using a lightweight architecture for the web of things, Computing, 10.1007/s00607-014-0397-6
BUTLER Project. <http://www.iot-butler.eu>.
P. Kasinathan, G. Costamagna, H. Khaleel, C. Pastrone, M. Spirito, Demo: An ids Framework for Internet of Things Empowered by 6lowpan, Berlin, Germany, 2013, pp. 1337–1339.
HYDRA Project. <http://www.hydramiddleware.eu/>.
Usable Trust in the Internet of Things. <http://www.utrustit.eu/>.
iCORE Project. <http://www.iot-icore.eu>.
HACMS Project. <http://www.defenseone.com/technology>.
National Science Foundation Project. <http://www.nsf.gov>.
Roseline Project. <https://sites.google.com/site/roselineproject/>.
XIA-NP Project. <http://www.cs.cmu.edu/xia/>.
NDN-NP Project. <http://named-data.net/>.
NEBULA Project. <http://nebula-fia.org/>.
MobilityFirst-NP Project. <http://mobilityfirst.winlab.rutgers.edu/>.
Ma, 2011, Internet of things: objectives and scientific challenges, J. Comput. Sci. Technol., 26, 919, 10.1007/s11390-011-1189-5
FIRE EU-China Project. <http://www.euchina-fire.eu/>.
FIRE EU-Korea Project. <http://eukorea-fire.eu/>.
EU-Japan Project. <http://www.eurojapan-ict.org/>.