Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 16
Page No. 4132 - 4137

An Overview on Security Features for Internet of Things (IoT) in Perception Layer

Authors : Nur Syazarin Natasha Abd Aziz, Salwani Mohd Daud, Sya Azmeela Syarif, Hafiza Abas and Azizul Azizan

References

Abdmeziem, M.R. and D. Tandjaoui, 2015. An end-to-end secure key management protocol for e-health applications. Comput. Electr. Eng., 44: 184-197.
Direct Link  |  

Aramudhan, M. and K. Mohan, 2010. New secure communication protocols for e-mobile health system. Proceedings of the 2nd International Conference on Networked Digital Technologies, July 7-9, 2010, Springer, Prague, Czech Republic, pp: 639-647.

Bendovschi, A., 2015. Cyber-attacks–trends, patterns and security countermeasures. Procedia Econ. Finance, 28: 24-31.
Direct Link  |  

Bulck, V.J., J. Noorman, J.T. Mühlberg and F. Piessens, 2015. Secure resource sharing for embedded protected module architectures. Proceedings of the IFIP International Conference on Information Security Theory and Practice, August 24-25, 2015, Springer, Heraklion, Crete, pp: 71-87.

Chen, H.C., I. You, C.E. Weng, C.H. Cheng and Y.F. Huang, 2016. A security gateway application for End-to-End M2M communications. Comput. Stand. Interfaces, 44: 85-93.
Direct Link  |  

Das, M.L., 2013. Strong security and privacy of RFID system for internet of things infrastructure. Proceedings of the International Conference on Security, Privacy and Applied Cryptography Engineering, October 19-23, 2013, Springer, Berlin, Germany, pp: 56-69.

Das, M.L., 2015. Privacy and security challenges in internet of things. Proceedings of the 11th International Conference on Distributed Computing and Internet Technology, February 5-8, 2015, Springer, Bhubaneswar, India, pp: 33-48.

David, N., 2013. How the Internet of Things is Revolutionizing Healthcare. Freescale Semiconductor, Austin, Texas, USA.,.

Gou, Q., L. Yan, Y. Liu and Y. Li, 2013. Construction and strategies in iot security system. Proceedings of the IEEE International Conference on Internet of Things Cyber, Physical and Social Computing Green Computing and Communications, August 20-23, 2013, IEEE, Beijing, China, ISBN:978-0-7695-5046-6, pp: 1129-1132.

Hou, J.L. and K.H. Yeh, 2015. Novel authentication schemes for IoT based healthcare systems. Intl. J. Distrib. Sens. Networks, 2015: 1-9.
Direct Link  |  

Jing, Q., A.V. Vasilakos, J. Wan, J. Lu and D. Qiu, 2014. Security of the internet of things: Perspectives and challenges. Wireless Networks, 20: 2481-2501.
CrossRef  |  Direct Link  |  

Kumar, S.A., T. Vealey and H. Srivastava, 2016. Security in internet of things: Challenges, solutions and future directions. Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS), January 5-8, 2016, IEEE, Koloa, Hawaii, USA., ISBN:978-0-7695-5670-3, pp: 5772-5781.

Martı, R., J. Delgado and X. Perramon, 2004. Network and application security in mobile e-health applications. Proceedings of the International Conference on 2004 ICOIN Information Networking, February 18-20, 2004, Springer, Busan, Korea, pp: 995-1004.

Moosavi, S.R., T.N. Gia, A.M. Rahmani, E. Nigussie and S. Virtanen et al., 2015. SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput. Sci., 52: 452-459.
Direct Link  |  

Oh, D., D. Kim and W.W. Ro, 2014. A malicious pattern detection engine for embedded security systems in the internet of things. Sens., 14: 24188-24211.
CrossRef  |  PubMed  |  Direct Link  |  

Olivier, F., G. Carlos and N. Florent, 2015. New security architecture for IoT network. Procedia Comput. Sci., 52: 1028-1033.
Direct Link  |  

Santos, A., J. Macedo, A. Costa and M.J. Nicolau, 2014. Internet of things and smart objects for m-health monitoring and control. Procedia Technol., 16: 1351-1360.
Direct Link  |  

Sharma, D. and D. Jinwala, 2015. Functional encryption in IoT e-health care system. Proceedings of the International Conference on Information Systems Security, December 16-20, 2015, Springer, Kolkata, India, pp: 345-363.

Sicari, S., A. Rizzardi, L.A. Grieco and P.A. Coen, 2015. Security, privacy and trust in internet of things: The road ahead. Comput. Networks, 76: 146-164.
Direct Link  |  

Yan, T. and Q. Wen, 2011. Building the Internet of Things using a Mobile RFID Security Protocol Based on Information Technology. In: Advances in Computer Science, Intelligent System and Environment, Jin, D. and S. Lin, (Eds.). Springer, Berlin, Germany, pp: 143-149.

Yang, X., Z. Li, Z. Geng and H. Zhang, 2012. A multi-layer security model for internet of things. Proceedings of the International Conference on Internet of things, Communications in Computer and Information Science, August 17-19, 2012, Springer, Changsha, China, pp: 388-393.

Zhao, K. and L. Ge, 2013. A survey on the intenet of things security. Proceedings of the 9th International Conference on Computational Intelligence and Security, December 14-15, 2013, IEEE, Leshan, China, ISBN:978-1-4799-2549-0, pp: 663-667.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved