Profile
International Journal of Computer & Software Engineering Volume 4 (2019), Article ID 4:IJCSE-148, 7 pages
https://doi.org/10.15344/2456-4451/2019/148
Review Article
The Review of IoT Security Framework Based on Mobile Edge Computing

Fan Yongkai1,2, Zhao Guanqun1,2, Sun Xiaofeng1,2* and Lin Xiaodong1,2

1Beijing Key Lab of Petroleum Data Mining, China University of Petroleum, Beijing, China
2Departmentt of Computer Science and Technology, China University of Petroleum, Beijing, China
Sun Xiaofeng, Beijing Key Lab of Petroleum Data Mining, China University of Petroleum, 18 Fuxue Rd, Changping Qu, Beijing Shi, China; E-mail: 2017011316@student.cup.edu.cn
10 June 2019; 16 July 2019; 18 July 2019
Yongkai F, Guanqun Z, Xiaofeng S, Xiaodong L (2019) The Review of IoT Security Framework Based on Mobile Edge Computing. Int J Comput Softw Eng 4: 148. doi: https://doi.org/10.15344/2456-4451/2019/148
This work was partially supported by CERNET Innovation Project (No. NGII20180406), by Beijing Higher Education Young Elite Teacher Project (No. YETP0683), by Beijing Higher Education Teacher Project (No. 00001149).

References

  1. Luigi A, Lera A, Morabito G (2010) The internet of things: A survey. Computer networks 15: 2787-2805. View
  2. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems 29: 1645-1660. View
  3. Kulkarni A, Sathe S (2014) Healthcare applications of the Internet of Things: A Review. International Journal of Computer Science and Information Technologies 5: 6229-6232. View
  4. Madakam S, Ramaswamy R, Tripathi S (2015) Internet of Things (IoT): A literature review. Journal of Computer and Communications 3: 164. View
  5. Barnaghi P, Wang W, Henson C, Taylor K (2012) Semantics for the Internet of Things: early progress and back to the future. International Journal on Semantic Web and Information Systems (IJSWIS) 8: 1-21. View
  6. Internet of things based on smart objects: Technology, middleware and applications. Springer Science & Business Media.
  7. Jie Y, Pei J Y, Jun L (2013) Smart home system based on iot technologies. International Conference on Computational and Information Sciences. IEEE 2013: 1789-1791.
  8. Siano P (2014) Demand response and smart grids-A survey. Renewable and sustainable energy reviews 30: 461-478. View
  9. Kyriazis D, Varvarigou T, White D, Rossi A, Cooper J, et al. (2013) Sustainable smart city IoT applications: Heat and electricity management & Eco-conscious cruise control for public transportation. IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM). View
  10. Li H, Lei X, Yan Z, ChunLi Y (2012) The application and implementation research of smart city in China. International Conference on System Science and Engineering. View
  11. Maheswari SU, Usha NS, Anita EAM, Devi KR et al. (2016) A novel robust routing protocol RAEED to avoid DoS attacks in WSN. International Conference on Information Communication and Embedded Systems. View
  12. Staake AT, Fleisch E (2009) Using sensor information to reduce the carbon footprint of perishable goods. IEEE Pervasive Computing 8: 22-29. View
  13. Xu LD, He W, Li S (2014) Internet of Things in industries: A survey. IEEE Trans Ind Informat 10: 2233-2243. View
  14. Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. International conference on computer science and electronics engineering. IEEE 3: 648-651. View
  15. Liu J, Xiao Y, Chen CLP (2012) Internet of things' authentication and access control. International Journal of Security and Networks 7: 228-241. View
  16. Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications 84: 25-37. View
  17. Ho HY (2015) Iot security & privacy: threats and challenges. Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security. ACM. View
  18. Arijit U, Bandyopadhyay S, Pal A (2014) IoT-privacy: To be private or not to be private. IEEE Conference on Computer Communications Workshops. View
  19. Monir S (2016) A Lightweight Attribute-Based Access Control System for IoT. View
  20. Pacheco J, Hariri S (2016) IEEE 2016 IEEE 1st International Workshops on Foundations and Applications of Self Systems (FAS*W) - Augsburg, Germany. IEEE 1st International Workshops on Foundations and Applications of Self Systems (FAS*W) - IoT Security Framework for Smart Cyber Infrastructures[C]// Foundations & Applications of Self Systems, IEEE International Workshops 2016: 242-247.
  21. Huang X, Craig P, Lin H (2016) SecIo T: a security framework for the Internet of Things. Security and Communication Networks 9: 3083-3094.
  22. Rahman AFA, Daud M, Mohamad MZ (2016) Securing sensor to cloud ecosystem using internet of things (iot) security framework. Proceedings of the International Conference on Internet of things and Cloud Computing. ACM. View