International Journal of Computer & Software Engineering Volume 4 (2019), Article ID 4:IJCSE-148, 7 pages
https://doi.org/10.15344/2456-4451/2019/148
https://doi.org/10.15344/2456-4451/2019/148
Review Article
The Review of IoT Security Framework Based on Mobile Edge Computing
References
- Luigi A, Lera A, Morabito G (2010) The internet of things: A survey. Computer networks 15: 2787-2805. View
- Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems 29: 1645-1660. View
- Kulkarni A, Sathe S (2014) Healthcare applications of the Internet of Things: A Review. International Journal of Computer Science and Information Technologies 5: 6229-6232. View
- Madakam S, Ramaswamy R, Tripathi S (2015) Internet of Things (IoT): A literature review. Journal of Computer and Communications 3: 164. View
- Barnaghi P, Wang W, Henson C, Taylor K (2012) Semantics for the Internet of Things: early progress and back to the future. International Journal on Semantic Web and Information Systems (IJSWIS) 8: 1-21. View
- Internet of things based on smart objects: Technology, middleware and applications. Springer Science & Business Media.
- Jie Y, Pei J Y, Jun L (2013) Smart home system based on iot technologies. International Conference on Computational and Information Sciences. IEEE 2013: 1789-1791.
- Siano P (2014) Demand response and smart grids-A survey. Renewable and sustainable energy reviews 30: 461-478. View
- Kyriazis D, Varvarigou T, White D, Rossi A, Cooper J, et al. (2013) Sustainable smart city IoT applications: Heat and electricity management & Eco-conscious cruise control for public transportation. IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM). View
- Li H, Lei X, Yan Z, ChunLi Y (2012) The application and implementation research of smart city in China. International Conference on System Science and Engineering. View
- Maheswari SU, Usha NS, Anita EAM, Devi KR et al. (2016) A novel robust routing protocol RAEED to avoid DoS attacks in WSN. International Conference on Information Communication and Embedded Systems. View
- Staake AT, Fleisch E (2009) Using sensor information to reduce the carbon footprint of perishable goods. IEEE Pervasive Computing 8: 22-29. View
- Xu LD, He W, Li S (2014) Internet of Things in industries: A survey. IEEE Trans Ind Informat 10: 2233-2243. View
- Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. International conference on computer science and electronics engineering. IEEE 3: 648-651. View
- Liu J, Xiao Y, Chen CLP (2012) Internet of things' authentication and access control. International Journal of Security and Networks 7: 228-241. View
- Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications 84: 25-37. View
- Ho HY (2015) Iot security & privacy: threats and challenges. Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security. ACM. View
- Arijit U, Bandyopadhyay S, Pal A (2014) IoT-privacy: To be private or not to be private. IEEE Conference on Computer Communications Workshops. View
- Monir S (2016) A Lightweight Attribute-Based Access Control System for IoT. View
- Pacheco J, Hariri S (2016) IEEE 2016 IEEE 1st International Workshops on Foundations and Applications of Self Systems (FAS*W) - Augsburg, Germany. IEEE 1st International Workshops on Foundations and Applications of Self Systems (FAS*W) - IoT Security Framework for Smart Cyber Infrastructures[C]// Foundations & Applications of Self Systems, IEEE International Workshops 2016: 242-247.
- Huang X, Craig P, Lin H (2016) SecIo T: a security framework for the Internet of Things. Security and Communication Networks 9: 3083-3094.
- Rahman AFA, Daud M, Mohamad MZ (2016) Securing sensor to cloud ecosystem using internet of things (iot) security framework. Proceedings of the International Conference on Internet of things and Cloud Computing. ACM. View