참고문헌
- CASAGRAS Partnership, "CASAGRAS final report: RFID and the inclusive model for the internet of things," EU Project No. 216803, 2009.
- S. Umamaheswari and G. Radhamani, "Enhanced ANTSEC framework with cluster based cooperative caching in mobile ad hoc networks," Journal of Communications and Networks, vol. 17, no. 1, pp. 40-46, 2015. https://doi.org/10.1109/JCN.2015.000008
- E. E. Zakaria, H. S. Hamza, and I. A. Saroit, "An integrated security framework for access control and address auto-configuration for MANETs," in Proceedings of 8th IFIP Wireless and Mobile Networking Conference (WMNC), Munich, Germany, 2015, pp. 253-260.
- A. B. Waluyo, D. Taniar, W. Rahayu, and B. Srinivasan, "Trustworthy data delivery in mobile P2P network," Journal of Computer and System Sciences, vol. 86, pp. 33-48, 2017. https://doi.org/10.1016/j.jcss.2016.09.007
- B. Zhang, Z. Huang, and Y. Xiang, "A novel multiple-level trust management framework for wireless sensor networks," Computer Networks, vol. 72, pp. 45-61, 2014. https://doi.org/10.1016/j.comnet.2014.06.015
- C. Zhu, H. Wang, X. Liu, L. Shu, L. T. Yang, and V. C. M. Leung, "A novel sensory data processing framework to integrate sensor networks with mobile cloud," IEEE Systems Journal, vol. 10, no. 3, pp. 1125-1136, 2016. https://doi.org/10.1109/JSYST.2014.2300535
- J. Wu, K. Ota, M. Dong, and C. Li, "A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities," IEEE Access, vol. 4, pp. 416-424, 2016. https://doi.org/10.1109/ACCESS.2016.2517321
- A. Sheikhi, M. Rayati, S. Bahrami, A. M. Ranjbar, and S. Sattari, "A cloud computing framework on demand side management game in smart energy hubs," International Journal of Electrical Power & Energy Systems, vol. 64, pp. 1007-1016, 2015. https://doi.org/10.1016/j.ijepes.2014.08.020
- U. S. Premarathne, I. Khalil, and M. Atiquzzaman, "Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications," Computer Networks, vol. 88, pp. 161-177, 2015. https://doi.org/10.1016/j.comnet.2015.06.002
- D. Conzon, T. Bolognesi, P. Brizzi, A. Lotito, R. Tomasi, and M. A. Spirito, "The VIRTUS middleware: an XMPP based architecture for secure IoT communications," in Proceedings of 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 2012, pp. 1-6.
- R. Neisse, G. Steri, I. N. Fovino, and G. Baldini, "SecKit: a model-based security toolkit for the internet of things," Computers & Security, vol. 54, pp. 60-76, 2015. https://doi.org/10.1016/j.cose.2015.06.002
- A. Samani, H. H. Ghenniwa, and A. Wahaishi, "Privacy in internet of things : a model and protection framework," in Procedia Computer Science, vol. 52, pp. 606-613, 2015. https://doi.org/10.1016/j.procs.2015.05.046
- V. Suryani, S. Sulistyo, and W. Widyawan, "ConTrust : a trust model to enhance the privacy in internet of things," International Journal of Intelligent Engineering & Systems, vol. 10, no. 3, pp. 30-37, 2017.
- K. Kang, Z. B. Pang, and C. Wang, "Security and privacy mechanism for health internet of things," The Journal of China Universities of Posts and Telecommunications, vol. 20(Suppl 2), pp. 64-68, 2013.
- X. Xu, N. Bessis, and J. Cao, "An autonomic agent trust model for IoT systems," in Procedia Computer Science, vol. 21, pp. 107-113, 2013. https://doi.org/10.1016/j.procs.2013.09.016
- M. Henze, L. Hermerschmidt, D. Kerpen, R. Haubling, B. Rumpe, and K. Wehrle, "A comprehensive approach to privacy in the cloud-based internet of things," Future Generation Computer Systems, vol. 56, pp. 701-718, 2016. https://doi.org/10.1016/j.future.2015.09.016
- J. Su, D. Cao, B. Zhao, X. Wang, and I. You, "ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things," Future Generation Computer Systems, vol. 33, pp. 11-18, 2014. https://doi.org/10.1016/j.future.2013.10.016
- M. S. Farash, M. Turkanovic, S. Kumari, and M. Holbl, "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment," Ad Hoc Networks, vol. 36(Part 1), pp. 152-176, 2016. https://doi.org/10.1016/j.adhoc.2015.05.014
- Z. Chen and L. Tian, "Privacy-preserving model of IoT based trust evaluation," IEICE Transactions on Information and Systems, vol. E100-D, no. 2, pp. 371-374, 2017. https://doi.org/10.1587/transinf.2016EDL8185
- H. Sato, A. Kanai, S. Tanimoto, and T. Kobayashi, "Establishing trust in the emerging era of IoT," in Proceedings of IEEE Symposium on Service-Oriented System Engineering (SOSE), Oxford, UK, 2016, pp. 398-406.
- A. S. Tanenbaum, Computer Network. Boston, MA: Pearson Education Inc., 2003.
- L. Atzori, A. Iera, and G. Morabito, "SIoT: giving a social structure to the internet of things," IEEE Communications Letters, vol. 15, no. 11, pp. 1193-1195, 2011. https://doi.org/10.1109/LCOMM.2011.090911.111340
피인용 문헌
- Driving behaviors analysis based on feature selection and statistical approach: a preliminary study pp.1573-0484, 2018, https://doi.org/10.1007/s11227-018-2618-9