Название | Industrial Internet of Things (IIoT) |
---|---|
Автор произведения | Группа авторов |
Жанр | Программы |
Серия | |
Издательство | Программы |
Год выпуска | 0 |
isbn | 9781119769002 |
3. Warner, M.R., Internet of Things cyber security improvement act of 2017. S. 1691, 115th US Congress, Sep. 2017.
4. Granjal, J., Monteiro, E., Silva, J.S., Security for the Internet of Things: A survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor., 17, 3, 1294–1312, Jan. 2015.
5. Hossain, M.M., Fotouhi, M., Hasan, R., Towards an analysis of security issues, challenges, and open problems in the Internet of Things, in: Proceedings of IEEE World Congress on Services, pp. 21–28, Jun. 2015.
6. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J., DDoS in the IoT: Mirai and other botnets. Computer, 50, 7, 80–84, Jul. 2017.
7. Xu, T., Wendt, J.B., Potkonjak, M., Security of IoT systems: Design challenges and opportunities, in: Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, Nov. 2014, pp. 417–423.
8. Ammar, M., Russello, G., Crispo, B., Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl., 38, 8–27, Feb. 2018. [14] Frustaci, M., Pace, P., Aloi, G., Fortino, G., Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet Things J., 5, 4, 2483–2495, Aug. 2018.
9. Zhou, W., Jia, Y., Peng, A., Zhang, Y., Liu, P., The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet Things J., 6, 2, 1606–1616, Apr. 2019.
10. Atac, C. and Akleylek, S., A Survey on Security Threats and Solutions in the Age of IoT. Eur. J. Sci. Theol., 15, 36–42, March 2019.
11. Marketwired, Proofpoint uncovers Internet of Things cyberattack, 2014, Jan, Accessed on Jun. 2019. [Online]. Available: https://www.proofpoint.com/us/proofpoint-uncovers-internet-things-iot-cyberattack.
12. Fremantle, P. and Scott, P., A survey of secure middleware for the Internet of Things. PeerJ Comput. Sci., 3, e114, May 2017.
13. Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A., Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw., 76, Supplement C, 146–164, Jan. 2015.
14. Pielli, C., Zucchetto, D., Zanella, A., Vangelista, L., Zorzi, M., Platforms and protocols for the Internet of Things. EAI Endorsed Trans. Internet Things, 15, 1, Oct. 2015.
15. Singh, A., Chawla, N., Ko, J.H., Kar, M., Mukhopadhyay, S., Energy efficient and side-channel secure cryptographic hardware for IoT-edge nodes. IEEE Internet Things J., 6, 1, 421–434, Feb. 2019.
16. Mosenia, A. and Jha, N.K., A comprehensive study of security of Internet of Things. IEEE Trans. Emerg. Topics Comput., 5, 4, 586–602, Oct. 2017.
17. Ronen, E. and Shamir, A., Extended functionality assaults on IoT devices: The case of smart lights, in: Proceedings of the IEEE European Symposium on Security and Privacy, pp. 3–12, Mar. 2016.
18. Li, L., Study on security architecture in the internet of things, in: Proceedings of 2012 International Conference on Measurement, Information and Control, vol. 1, IEEE, pp. 374–377, 2012.
19. Han, J.-H., Jeon, Y., Kim, J., Security considerations for secure and trustworthy smart home system in the IoT environment, in: 2015 International Conference on Information and Communication Technology Convergence (ICTC), IEEE, pp. 1116–1118, 2015.
20. Vorakulpipat, C., Rattanalerdnusorn, E., Thaenkaew, P., Hai, H.D., Recent challenges, trends, and concerns related to IoT security: An evolutionary study, in: 2018 20th International Conference on Advanced Communication Technology (ICACT), IEEE, pp. 405–410, 2018.
21. Alrowaily, M. and Lu, Z., Secure edge computing in IoT systems: Review and case studies, in: 2018 IEEE/ACM Symposium on Edge Computing (SEC), IEEE, pp. 440–444, 2018.
22. Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P., Network intrusion detection for IoT security based on learning techniques, in: IEEE Communications Surveys and Tutorials, 2019.
23. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M., Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor., 17, 4, 2347–2376, 2015.
24. Kim, J. and Kim, H., Security vulnerability and considerations in mobile rfid environment, in: 2006 8th International Conference Advanced Communication Technology, vol. 1, IEEE, pp. 801–804, 2006.
25. Bedhief, I., Kassar, M., Aguili, T., Sdn-based architecture challenging the IoT heterogeneity, in: 2016 3rd Smart Cloud Networks and Systems (SCNS), IEEE, pp. 1–3, 2016.
26. Kalkan, K. and Zeadally, S., Securing Internet of Things (IoT) with software defined networking (sdn). IEEE Commun. Mag., 99, 1–7, 2017.
27. Sidki, L., Ben-Shimol, Y., Sadovski, A., Fault tolerant mechanisms for sdn controllers, in: 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), IEEE, pp. 173–178, 2016.
28. Shi, Z., Liao, K., Yin, S., Ou, Q., Design and implementation of the mobile internet of things based on td-scdma network, in: 2010 IEEE International Conference on Information Theory and Information Security, IEEE, pp. 954– 957, 2010.
29. Conti, M., Dragoni, N., Lesyk, V., A survey of man in the middle assaults. IEEE Commun. Surv. Tutor., 18, 3, 2027–2051, 2016.
30. Tumrongwittayapak, C. and Varakulsiripunth, R., Detecting sinkhole attack and selective forwarding attack in wireless sensor networks, in: 2009 7th International Conference on Information, Communications and Signal Processing (ICICS), IEEE, pp. 1–5, 2009.
31. Strba, S., Internet of Things Security: Ongoing Threats and Proposed Solutions, 2018.
32. Jesudoss, A. and Subramaniam, N., A survey on authentication assaults and countermeasures in a distributed environment. Indian J. Comput. Sci. Eng. (IJCSE), 5, 2, 71–77, 2014.
33. Gadaleta, F. et al., Instruction-level countermeasures against stack-based buffer overflow assaults. ACM International Conference Proceeding Series, Francesco Gadaleta, 2009.
34. Lonzetta, A. et al., Security vulnerabilities in Bluetooth technology as used in IoT. J. Sens. Actuator Netw., 7, 3, 28, 2018.
35. Newsome, J. et al., The sybil attack in sensor networks: analysis and defenses. Third international symposium on information processing in sensor networks, 2004. IPSN 2004, IEEE, 2004.
36. Huang, Y. et al., Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun. Mag., 51, 1, 27–33, 2013.
37. Data, Mahendra, The Defense Against ARP Spoofing Attack Using Semi-Static ARP Cache Table. 2018 International Conference on Sustainable Information Engineering and Technology (SIET), IEEE, 2018.
38. Alharbi, F. et al., Collaborative Client-Side DNS Cache Poisoning Attack. IEEE INFOCOM 2019-IEEE Conference on Computer Communications, IEEE, 2019.
39. Ding, D. et al., A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing, 275, 1674–1683, 2018.
40. Ma, R. et al., Defenses against wormhole assaults in wireless sensor networks. International Conference on Network and System Security,