CPE826 - Tópicos Especiais em Comunicações Móveis e Segurança
- C. Liu, Y. Zhang and H. Zhang, "A Novel Approach to IoT Security Based on Immunology," Computational Intelligence and Security (CIS), 2013 9th International Conference on, Leshan, 2013, pp. 771-775.
keywords: {Internet; Internet of Things; computer network security; Internet-of-things; IoT mass attribute; IoT security; biological immune systems; biological immunology; dispersity attribute; dynamic defense frame; immunity-based antigen; network security models; pathogen recognition; Computational modeling; Computers; Detectors; Educational institutions; Immune system; Internet; Security; Detection; Detector; Immunology; IoT Security; Security Defense},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6746536&isnumber=6746335 - T. Xu, J. B. Wendt and M. Potkonjak, "Security of IoT systems: Design challenges and opportunities," 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, 2014, pp. 417-423.
keywords: {CAD; Internet of Things; data privacy; CAD; Internet of Things; computer-aided design; digital forgetting; hardware-based IoT security; privacy; semantic attack; trusted sensing; Computer architecture; Delays; Hardware; Logic gates; Microprocessors; Protocols; Security},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7001385&isnumber=7001313 - R. Mahmoud, T. Yousuf, F. Aloul and I. Zualkernan, "Internet of things (IoT) security: Current status, challenges and prospective measures," 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), London, 2015, pp. 336-341.
keywords: {Internet of Things; computer network security; security of data; wireless LAN; Internet of Things security; IoT security; application layer; network layer; perception layer; three-layer architecture; Encryption; Internet; Protocols; Sensors; Transportation; Wireless sensor networks; Internet of things; IoT; Security},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7412116&isnumber=7412034 - Z. K. Zhang, M. C. Y. Cho, C. W. Wang, C. W. Hsu, C. K. Chen and S. Shieh, "IoT Security: Ongoing Challenges and Research Opportunities," 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, 2014, pp. 230-234.
keywords: {Internet; Internet of Things; data privacy; invasive software; Internet; Internet-of-things; IoT security; authenticity; home appliances; information security preservation; malware; wearable devices; Androids; Cryptography; Humanoid robots; Internet of Things; Malware; Software; Internet of Things; authenticity; identification; information security; malware; naming},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6978614&isnumber=6978154 - S. Kraijak and P. Tuwanut, "A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends," 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Shanghai, 2015, pp. 1-6.
keywords: {Internet; Internet of Things; computer network security; data privacy; microcontrollers; protocols; Arduino; Internet communication; Internet of Things; IoT applications; IoT architecture; IoT future trend; IoT privacy; IoT protocol; IoT real-world implementation; IoT security; cyberspace; intelligent sensor; machine-to-machine basis; Future Trends; Internet of Things; IoT Applications; IoT Architecture; IoT Protocols; Privacy; Security},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7446846&isnumber=7386275 - A. Riahi, E. Natalizio, Y. Challal, N. Mitton and A. Iera, "A systemic and cognitive approach for IoT security," Computing, Networking and Communications (ICNC), 2014 International Conference on, Honolulu, HI, 2014, pp. 183-188.
doi: 10.1109/ICCNC.2014.6785328
keywords: {Internet of Things; data privacy; security of data; IoT security; cognitive dimension; control processes; internet of things; object autonomy; privacy protection; safety guarantee; smart objects; systemic dimension; technological ecosystem; Context; Data privacy; Ecosystems; Privacy; Reliability; Safety; Security},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6785328&isnumber=6785290 - M. M. Hossain, M. Fotouhi and R. Hasan,
"Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things," 2015 IEEE World Congress on Services, New York City, NY, 2015, pp. 21-28.
keywords: {Internet of Things; data privacy; security of data; Internet of Things; IoT devices; IoT security; e-commerce; e-health; e-home; e-trafficking; forensics; malicious attacks; privacy; security challenges; security issues; security requirements; threat model; Intelligent sensors; Internet of things; Logic gates; Performance evaluation; Protocols; Security; Attack Surfaces; Attack Taxonomy; Internet of Things; IoT Forensics; Security Challenges; Security Requirements; Threat Model},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7196499&isnumber=7196486
• Slides 1ª Apresentação (06/07/2016) - S. M. Sajjad and M. Yousaf, "Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)," Information Assurance and Cyber Security (CIACS), 2014 Conference on, Rawalpindi, 2014, pp. 9-14.
keywords: {Internet of Things; Zigbee; access protocols; computer network security; CAP; CFP; IEEE 802.15.4 MAC protocol; IEEE 802.15.4 security charter; Internet of Things; IoT; contention access period; contention free period; security mechanism; IEEE 802.15 Standards; Internet of Things; Payloads; Protocols; Radiation detectors; Security; Synchronization; IEEE 802.15.4; Internet of Things; IoT IETF Standardization; IoT Protocol Stack; Security},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6861324&isnumber=6861314 - M. Singh, M. A. Rajan, V. L. Shivraj and P. Balamuralidhar, "Secure MQTT for Internet of Things (IoT), " Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on, Gwalior, 2015, pp. 746-751.
keywords: {Internet of Things; access protocols; cryptography; telecommunication security; telemetry; CoAP; D2D communications; Internet of Things; IoT; MQTT-SN; communication protocols; constrained access protocol; device to device communications; elliptic curve cryptography; information communication technology; key/cipher text policy-attribute based encryption; message queue telemetry transport; sensor networks; Elliptic curve cryptography; Encryption; Logic gates; Payloads; Protocols; Electronic Commerce; Free Movement; Legal Protection; Personal Information},
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7280018&isnumber=7279856
Verde: apresentado
Vermelho: próxima apresentação