Security, privacy and trust in Internet of Things: The road ahead

Computer Networks - Tập 76 - Trang 146-164 - 2015
Sabrina Sicari1, Alessandra Rizzardi1, Luigi Alfredo Grieco2, Alberto Coen‐Porisini1
1DISTA, Dep. of Theoretical and Applied Science, University of Insubria, v. Mazzini 5, 21100 Varese, Italy
2DEI, Dep. of Electrical and Information Engineering, Politecnico di Bari, v. Orabona 4, 70125 Bari, Italy

Tóm tắt

Từ khóa


Tài liệu tham khảo

Atzori, 2010, The internet of things: a survey, Comput. Netw., 54, 2787, 10.1016/j.comnet.2010.05.010

Miorandi, 2012, Survey internet of things: vision, applications and research challenges, Ad Hoc Netw., 10, 1497, 10.1016/j.adhoc.2012.02.016

Palattella, 2013, Standardized protocol stack for the internet of (important) things, IEEE Commun. Surv. Tutorials, 15, 1389, 10.1109/SURV.2012.111412.00158

Emmerson, 2010, M2M: the internet of 50 billion devices, Huawei Win–Win Mag. J., 19

Boswarthick, 2012

Hersent, 2012

L.A. Grieco, M.B. Alaya, T. Monteil, K.K. Drira, Architecting information centric ETSI-M2M systems, in: IEEE PerCom, 2014.

Weber, 2010, Internet of things - new security and privacy challenges, Comput. Law Secur. Rev., 26, 23, 10.1016/j.clsr.2009.11.008

H. Feng, W. Fu, Study of recent development about privacy and security of the internet of things, in: 2010 International Conference on Web Information Systems and Mining (WISM), Sanya, 2010, pp. 91–95.

Roman, 2013, On the features and challenges of security and privacy in distributed internet of things, Comput. Networks, 57, 2266, 10.1016/j.comnet.2012.12.018

J. Anderson, L. Rainie, The Internet of Things will Thrive by 2025, PewResearch Internet Project, May 2014. <http://www.pewinternet.org/2014/05/14/internet-of-things/>.

S. Bandyopadhyay, M. Sengupta, S. Maiti, S. Dutta, A survey of middleware for internet of things, in: Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey, 2011, pp. 288–296.

M.A. Chaqfeh, N. Mohamed, Challenges in middleware solutions for the internet of things, in: 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, 2012, pp. 21–26.

S. Babar, A. Stango, N. Prasad, J. Sen, R. Prasad, Proposed embedded security framework for internet of things (iot), in: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, Chennai, India, 2011, pp. 1 – 5.

Domingo, 2012, An overview of the internet of underwater things, J. Network Comput. Appl., 35, 1879, 10.1016/j.jnca.2012.07.012

Gubbi, 2013, Internet of Things (IoT): a vision, architectural elements, and future directions, Future Gener. Comput. Syst., 29, 1645, 10.1016/j.future.2013.01.010

Yan, 2014, A survey on trust management for internet of things, J. Network Comput. Appl., 42, 120, 10.1016/j.jnca.2014.01.014

Y. Zhao, Research on data security technology in internet of things, in: 2013 2nd International Conference on Mechatronics and Control Engineering, ICMCE 2013, Dalian, China, 2013, pp. 1752–1755.

Kothmayr, 2013, Dtls based security and two-way authentication for the internet of things, Ad Hoc Netw., 11, 2710, 10.1016/j.adhoc.2013.05.003

Roman, 2011, Key management systems for sensor networks in the context of the internet of things, Comput. Electrical Eng., 37, 147, 10.1016/j.compeleceng.2011.01.009

Du, 2005, A pairwise key predistribution scheme for wireless sensor networks, ACM Trans. Inf. Syst. Secur. (TISSEC), 8, 228, 10.1145/1065545.1065548

D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: CCS ’03 Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003, pp. 52–61.

H. Pranata, R. Athauda, G. Skinner, Securing and governing access in ad-hoc networks of internet of things, in: Proceedings of the IASTED International Conference on Engineering and Applied Science, EAS 2012, Colombo, Sri Lanka, 2012, pp. 84–90.

Ning, 2013, A security framework for the internet of things based on public key infrastructure, Adv. Mater. Res., 671–674, 3223

Wu, 2011, A security transmission model for internet of things, Jisuanji Xuebao/Chin. J. Comput., 34, 1351

G. Piro, G. Boggia, L.A. Grieco, A standard compliant security framework for ieee 802.15.4 networks, in: Proc. of IEEE World Forum on Internet of Things (WF-IoT), Seoul, South Korea, 2014, pp. 27–30.

Akyildiz, 2002, A survey on sensor networks, IEEE Commun. Mag., 40, 102, 10.1109/MCOM.2002.1024422

Chan, 2003, Security and privacy in sensor networks, IEEE Commun. Mag., 36, 103, 10.1109/MC.2003.1236475

Yick, 2008, Wireless sensor network survey, Comput. Netw., 52, 2292, 10.1016/j.comnet.2008.04.002

Li, 2009, Privacy preservation in wireless sensor networks: a state-of-the-art survey, Ad Hoc Netw., 7, 1501, 10.1016/j.adhoc.2009.04.009

Zhang, 2010, Security and privacy in sensor networks, J. Network Comput. Appl., 33, 63, 10.1016/j.jnca.2009.10.001

G.Sharmam, S. Bala, A.K. Verma, Security frameworks for wireless sensor networks-review, in: 2nd International Conference on Communication, Computing & Security, ICCCS-2012, 2012, pp. 978–987.

J.-Y. Lee, W.-C. Lin, Y.-H. Huang, A lightweight authentication protocol for internet of things, in: 2014 International Symposium on Next-Generation Electronics, ISNE 2014, Kwei-Shan, 2014, pp. 1–2.

Turkanovi, 2014, A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion, Ad Hoc Netw., 20, 96, 10.1016/j.adhoc.2014.03.009

Ye, 2014, An efficient authentication and access control scheme for perception layer of internet of things, Appl. Math. Inf. Sci., 8, 1617, 10.12785/amis/080416

Alcaide, 2013, Anonymous authentication for privacy-preserving iot target-driven applications, Comput. Secur., 37, 111, 10.1016/j.cose.2013.05.007

Ma, 2013, A hierarchical access control scheme for perceptual layer of iot, Jisuanji Yanjiu yu Fazhan/Comput. Res. Dev., 50, 1267

C. Hu, J. Zhang, Q. Wen, An identity-based personal location system with protected privacy in IoT, in: Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011, Shenzhen, China, 2011, pp. 192–195.

M. Ali, M. ElTabakh, C. Nita-Rotaru, FT-RC4: A Robust Security Mechanism for Data Stream Systems, Tech. Rep. TR-05-024, Purdue University (November 2005).

M.A. Hammad, M.J. Franklin, W. Aref, A.K. Elmagarmid, Scheduling for shared window joins over data streams, in: Proceedings of the 29th International Conference on Very Large Data Bases, VLDB ’03, Berlin, Germany, 2003, pp. 297–308.

S. Papadopoulos, Y. Yang, D. Papadias, Cads: continuous authentication on data streams, in: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB ’07, Vienna, Austria, 2007, pp. 135–146.

Papadopoulos, 2010, Continuous authentication on relational data streams, VLDB J., 19, 161, 10.1007/s00778-009-0145-2

S. Papadopoulos, G. Cormode, A. Deligiannakis, M. Garofalakis, Lightweight authentication of linear algebraic queries on data streams, in: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, SIGMOD’13, New York, USA, 2013, pp. 881–892.

W. Lindner, J. Meier, User interactive internet of things privacy preserved access control, in: 10th International Database Engineering and Applications Symposium, 2006, IDEAS’06, Delhi, 2006, pp. 137–147.

D.J. Abadi, Y. Ahmad, M. Balazinska, M. Cherniack, J. Hwang, W. Lindner, A.S. Maskey, E. Rasin, E. Ryvkina, N. Tatbul, Y. Xing, S. Zdonik, The design of the borealis stream processing engine, in: CIDR, 2005, pp. 277–289.

Sandhu, 1996, Role-based access control models, Computer, 29, 38, 10.1109/2.485845

R. Nehme, E. Rundesteiner, E. Bertino, A security punctuation framework for enforcing access control on streaming data, in: Proceedings of the 24th International Conference on Data Engineering, ICDE ’08, Cancun, Mexico, 2008, pp. 406–415.

Nehme, 2009, Tagging stream data for rich real-time services, Proc. VLDB Endowment, 2, 73, 10.14778/1687627.1687637

Y. Zhu, E.A. Rundensteiner, G.T. Heineman, Dynamic plan migration for continuous queries over data streams, in: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD ’04, Paris, France, 2004, pp. 431–442.

B. Carminati, E. Ferrari, K.L. Tan, Enforcing access control over data streams, in: Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT ’07, Sophia Antipolis, France, 2007, pp. 21–30.

B. Carminati, E. Ferrari, K.L. Tan, Specifying access control policies on data streams, in: Proceedings of the Database System for Advanced Applications Conference, DASFAA 2007, Bangkok, Thailand, 2007, pp. 410–421.

Abadi, 2003, Aurora: a new model and architecture for data stream management, VLDB J., 12, 120, 10.1007/s00778-003-0095-z

Carminati, 2010, A framework to enforce access control over data streams, ACM Trans. Inform. Syst. Sec. TISSEC, 13, 1, 10.1145/1805974.1805984

Gusmeroli, 2013, A capability-based security approach to manage access control in the internet of things, Math. Comput. Model., 58, 1189, 10.1016/j.mcm.2013.02.006

European FP7 IoT@Work project. <http://iot-at-work.eu>.

Mahalle, 2010, Identity management framework towards internet of things (IoT): Roadmap and key challenges, Commun. Comput. Inf. Sci., 89, 430, 10.1007/978-3-642-14478-3_43

A. Cherkaoui, L. Bossuet, L. Seitz, G. Selander, R. Borgaonkar, New paradigms for access control in constrained environments, in: 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Montpellier, 2014, pp. 1–4.

Veltri, 2013, A novel batch-based group key management protocol applied to the internet of things, Ad Hoc Netw., 11, 2724, 10.1016/j.adhoc.2013.05.009

S. Sicari, A. Rizzardi, C. Cappiello, A. Coen-Porisini, A NFP model for internet of things applications, in: Proc. of IEEE WiMob, Larnaca, Cyprus, 2014, pp. 164–171.

D. Evans, D. Eyers, Efficient data tagging for managing privacy in the internet of things, in: Proceedings – 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CPSCom 2012, Besancon, France, 2012, pp. 244–248.

X. Huang, R. Fu, B. Chen, T. Zhang, A. Roscoe, User interactive internet of things privacy preserved access control, in: 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, 2012, pp. 597–602.

Cao, 2011, CASTLE: continuously anonymizing data streams, IEEE Trans. Dependable Secure Comput., 8, 337, 10.1109/TDSC.2009.47

Yang, 2011, Security model and key technologies for the internet of things, J. China Universities Posts Telecommun., 8, 109, 10.1016/S1005-8885(10)60159-8

Y. Wang, Q. Wen, A privacy enhanced dns scheme for the internet of things, in: IET International Conference on Communication Technology and Application, ICCTA 2011, Beijing, China, 2011, pp. 699–702.

X. Wang, J. Zhang, E. Schooler, M. Ion, Performance evaluation of attribute-based encryption: Toward data privacy in the IoT, in: 2014 IEEE International Conference on Communications, ICC 2014, Sydney, NSW, 2014, pp. 725–730.

Su, 2014, ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things, Future Gener. Comput. Syst., 33, 11, 10.1016/j.future.2013.10.016

Peng, 2014, Privacy protection based on key-changed mutual authentication protocol in internet of things, Commun. Comput. Inf. Sci., 418 CCIS, 345, 10.1007/978-3-642-54522-1_34

A. Ukil, S. Bandyopadhyay, A. Pal, Iot-privacy: To be private or not to be private, in: Proceedings – IEEE INFOCOM, Toronto, ON, 2014, pp. 123–124.

Sicari, 2014, A security-and quality-aware system architecture for internet of things, Inf. Syst. Frontiers, 1

F. Bao, I. Chen, Dynamic trust management for internet of things applications, in: Proceedings of the 2012 International Workshop on Self-Aware Internet of Things, Self-IoT ’12, USA, San Jose, 2012, pp. 1–6.

F. Bao, I. Chen, Trust management for the internet of things and its application to service composition, in: 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, United States, 2012, pp. 1–6.

M. Nitti, R. Girau, L. Atzori, A. Iera, G. Morabito, A subjective model for trustworthiness evaluation in the social internet of things, in: 2012 IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC, Australia, Sydney, 2012, pp. 18–23.

S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigen-trust algorithm for reputation management in p2p networks, in: Proc. WWW’03, New York, USA, 2003, pp. 640–651.

Xiong, 2004, Peertrust: supporting reputation-based trust for peer-to-peer electronic communities, IEEE Trans. Knowl. Data Eng., 16, 843, 10.1109/TKDE.2004.1318566

A.A. Selcuk, E. Uzun, M.R. Pariente, A reputation-based trust management system for p2p networks, in: Proc. of CCGRID 2004, Washington, DC, USA, 2004, pp. 251–258.

B. Yu, M.P. Singh, K. Sycara, Developing trust in large-scale peer-to-peer systems, in: Proc. of First IEEE Symposium on Multi-Agent Security and Survivability, 2004, pp. 1–10.

Liang, 2005, Enforcing cooperative resource sharing in untrusted p2p computing environments, Mob. Netw. Appl., 10, 251, 10.1007/s11036-005-4453-5

Lacuesta, 2012, Internet of things: where to be is to trust, EURASIP J. Wireless Commun. Networking, 2012, 1, 10.1186/1687-1499-2012-203

P.N. Mahalle, P.A. Thakre, N.R. Prasad, R. Prasad, A fuzzy approach to trust based access control in internet of things, in: 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, VITAE, NJ, Atlantic City, 2013, pp. 1–5.

Wang, 2013, Distributed trust management mechanism for the internet of things, Appl. Mech. Mater., 347-350, 2463

Liu, 2012, An integrated scheme based on service classification in pervasive mobile services, Int. J. Commun. Syst., 25, 1178, 10.1002/dac.2330

Y. Liu, Z. Chen, F. Xia, X. Lv, F. Bu, A trust model based on service classification in mobile services, in: Proceedings – 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, Hangzhou, China, 2010, pp. 572–576.

Wen-Mao, 2012, A hierarchical trust model for the internet of things, Chin. J. Comput., 5, 846

Saied, 2013, Trust management system design for the internet of things: a context-aware and multi-service approach, Comput. Secur., 39, 351, 10.1016/j.cose.2013.09.001

Dong, 2012, Attack-resistant trust management model based on beta function for distributed routing in internet of things, China Commun., 9, 89

T. Liu, Y. Guan, Y. Yan, L. Liu, Q. Deng, A wsn-oriented key agreement protocol in internet of things, in: 3rd International Conference on Frontiers of Manufacturing Science and Measuring Technology, ICFMM 2013, LiJiang, China, 2012, pp. 1792–1795.

Martinez-Julia, 2013, Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet, Comput. Netw., 57, 2280, 10.1016/j.comnet.2012.11.020

G.D. Tormo, F.G. Marmol, G.M. Perez, Dynamic and flexible selection of a reputation mechanism for heterogeneous environments, Future Gener. Comput. Syst. (2014).

Gu, 2014, Trust management mechanism for internet of things, China Commun., 11, 148, 10.1109/CC.2014.6821746

Liu, 2014, Trust system based on node behavior detection in internet of things, Tongxin Xuebao/J. Commun., 35, 8

Macfarlane, 2012, Formal security policy implementations in network firewalls, Comput. Secur., 31, 253, 10.1016/j.cose.2011.10.003

Elrakaiby, 2012, Formal enforcement and management of obligation policies, Data Knowl. Eng., 71, 127, 10.1016/j.datak.2011.09.001

Wu, 2011, An innovative simulation environment for cross-domain policy enforcement, Simul. Model. Pract. Theory, 19, 1558, 10.1016/j.simpat.2011.03.005

Dell’Amico, 2013, Hipolds: a hierarchical security policy language for distributed systems, Inf. Secur. Technical Rep., 17, 81, 10.1016/j.istr.2012.10.002

Bella, 2011, Enforcing privacy in e-commerce by balancing anonymity and trust, Comput. Secur., 30, 705, 10.1016/j.cose.2011.08.005

Langar, 2011, Formal enforcement of security policies on concurrent systems, J. Symbol. Comput., 46, 997, 10.1016/j.jsc.2011.05.003

Baeten, 2005, A brief history of process algebra, Theoret. Comput. Sci., 335, 131, 10.1016/j.tcs.2004.07.036

Ferraiolo, 2011, The policy machine: a novel architecture and framework for access control policy specification and enforcement, J. Syst. Architec., 57, 412, 10.1016/j.sysarc.2010.04.005

D. Brewer, M. Nash, The chinese wall security policy, in: Proceedings. 1989 IEEE Symposium on Security and Privacy, Oakland, CA, 1989, pp. 206–214.

Bishop, 2003

Rao, 2009, A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources, Web Semantics: Sci. Serv. Agents World Wide Web, 7, 40, 10.1016/j.websem.2007.10.001

J. Singh, J. Bacon, D. Eyers, Policy enforcement within emerging distributed, event-based systems, in: DEBS 2014 – Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014, pp. 246–255.

R. Neisse, G. Steri, G. Baldini, Enforcement of security policy rules for the internet of things, in: Proc. of IEEE WiMob, Larnaca, Cyprus, 2014, pp. 120–127.

I. Bagci, S. Raza, T. Chung, U. Roedig, T. Voigt, Combined secure storage and communication for the internet of things, in: 2013 IEEE International Conference on Sensing, Communications and Networking, SECON 2013, New Orleans, LA, United States, 2013, pp. 523–631.

D. Conzon, T. Bolognesi, P. Brizzi, A. Lotito, R. Tomasi, M. Spirito, The virtus middleware: an xmpp based architecture for secure IoT communications, in: 2012 21st International Conference on Computer Communications and Networks, ICCCN 2012, Munich, Germany, 2012, pp. 1–6.

Gòmez-Goiri, 2014, Otsopack: lightweight semantic framework for interoperable ambient intelligence applications, Comput. Hum. Behav., 30, 460, 10.1016/j.chb.2013.06.022

M. Isa, N. Mohamed, H.H.S. Adnan, J. Manan, R. Mahmod, A lightweight and secure TFTP protocol for smart environment, in: ISCAIE 2012 – 2012 IEEE Symposium on Computer Applications and Industrial Electronics 2012, Kota Kinabalu, Malaysia, 2012, pp. 302–306.

Liu, 2013, Efficient naming, addressing and profile services in internet-of-things sensory environments, Ad Hoc Netw., 18, 85

oneM2M. <http://www.onem2m.org/>.

Colistra, 2014, The problem of task allocation in the internet of things and the consensus-based approach, Comput. Netw., 73, 98, 10.1016/j.comnet.2014.07.011

Wang, 2014, Middleware development method for internet of things, Liaoning Gongcheng Jishu Daxue Xuebao (Ziran Kexue Ban)/J. Liaoning Tech. Univ. (Nat. Sci. Ed.), 33, 675

H. Ferreira, R. De Sousa Jr., F. De Deus, E. Canedo, Proposal of a secure, deployable and transparent middleware for internet of things, in: Iberian Conference on Information Systems and Technologies, CISTI, Barcelona, 2014, pp. 1–4.

Mao, 2012, Rapid identification authentication protocol for mobile nodes in internet of things with privacy protection, J. Networks, 7, 1099

Jara, 2013, Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture, Int. J. Ad Hoc Ubiquitous Comput., 13, 228, 10.1504/IJAHUC.2013.055468

T. Yan, Q. Wen, A secure mobile rfid architecture for the internet of things, in: Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, Beijing, China, 2010, pp. 616–619.

W. Zhu, J. Yu, T. Wang, A security and privacy model for mobile rfid systems in the internet of things, in: International Conference on Communication Technology Proceedings, ICCT, 2012, pp. 726–732.

M. Elkhodr, S. Shanhrestani, H. Cheung, A review of mobile location privacy in the internet of things, in: International Conference on ICT and Knowledge Engineering, Bangkok, Thailand, 2012, pp. 266–272.

S. Li, P. Gong, Q. Yang, M. Li, J. Kong, P. Li, A secure handshake scheme for mobile-hierarchy city intelligent transportation system, in: International Conference on Ubiquitous and Future Networks, ICUFN, Da Nang, 2013, pp. 190–191.

Kang, 2013, Security and privacy mechanism for health internet of things, J. China Universities Posts Telecommun., 20, 64, 10.1016/S1005-8885(13)60219-8

F. Goncalves, J. Macedo, M. Nicolau, A. Santos, Security architecture for mobile e-health applications in medication control, in: 2013 21st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2013, Primosten, 2013, pp. 1–8.

Niu, 2014, Privacy and authentication protocol for mobile rfid systems, Wireless Pers. Commun., 77, 1713, 10.1007/s11277-014-1605-6

Jeong, 2014, An efficient and secure m-ips scheme of mobile devices for human-centric computing, J. Appl. Math. Special Issue, 2014, 1

Geng, 2014, Research on mobile information access based on internet of things, Appl. Mech. Mater., 539, 460, 10.4028/www.scientific.net/AMM.539.460

S. Kubler, K. Frmling, A. Buda, A standardized approach to deal with firewall and mobility policies in the iot, Pervasive Mobile Comput. (2014).

C. Perera, P. Jayaraman, A. Zaslavsky, D. Georgakopoulos, P. Christen, Mosden: An internet of things middleware for resource constrained mobile devices, in: Proceedings of the Annual Hawaii International Conference on System Sciences, Washington, DC, USA, 2014, pp. 1053–1062.

Montavont, 2014, Mobile {IPv6} in internet of things: analysis, experimentations and optimizations, Ad Hoc Netw., 14, 15, 10.1016/j.adhoc.2013.11.001

Rosario, 2014, A beaconless opportunistic routing based on a cross-layer approach for efficient video dissemination in mobile multimedia IoT applications, Comput. Commun., 45, 21, 10.1016/j.comcom.2014.04.002

Espada, 2014, Using extended web technologies to develop bluetooth multi-platform mobile applications for interact with smart things, Inf. Fusion, 21, 30

An, 2013, Research on social relations cognitive model of mobile nodes in internet of things, J. Network Comput. Appl., 36, 799, 10.1016/j.jnca.2012.12.004

Gronli, 2014, Towards NFC payments using a lightweight architecture for the web of things, Computing, 10.1007/s00607-014-0397-6

BUTLER Project. <http://www.iot-butler.eu>.

P. Kasinathan, G. Costamagna, H. Khaleel, C. Pastrone, M. Spirito, Demo: An ids Framework for Internet of Things Empowered by 6lowpan, Berlin, Germany, 2013, pp. 1337–1339.

HYDRA Project. <http://www.hydramiddleware.eu/>.

Usable Trust in the Internet of Things. <http://www.utrustit.eu/>.

iCORE Project. <http://www.iot-icore.eu>.

HACMS Project. <http://www.defenseone.com/technology>.

National Science Foundation Project. <http://www.nsf.gov>.

Roseline Project. <https://sites.google.com/site/roselineproject/>.

XIA-NP Project. <http://www.cs.cmu.edu/xia/>.

NDN-NP Project. <http://named-data.net/>.

NEBULA Project. <http://nebula-fia.org/>.

MobilityFirst-NP Project. <http://mobilityfirst.winlab.rutgers.edu/>.

Ma, 2011, Internet of things: objectives and scientific challenges, J. Comput. Sci. Technol., 26, 919, 10.1007/s11390-011-1189-5

FIRE EU-China Project. <http://www.euchina-fire.eu/>.

FIRE EU-Korea Project. <http://eukorea-fire.eu/>.

EU-Japan Project. <http://www.eurojapan-ict.org/>.