Browse > Article

SIOT: Secure Gateway for Internet of Things  

Kim, Yeon-Geun (한국과학기술원)
Go, Yeong-Hwan (한국과학기술원)
Kim, Min-Su (한국과학기술원)
Jang, Jin-Su (한국과학기술원)
Bae, Sang-Uk (한국과학기술원)
No, Ju-Hwan (한국과학기술원)
Gang, Byeong-Hun (한국과학기술원)
Park, Gyeong-Su (한국과학기술원)
Kim, Yong-Dae (한국과학기술원)
Sin, Seung-Won (한국과학기술원)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 M2M.World.News, "IDATE forecasts 80 Billion things connected in 2020", M2M World News, 2013, http://m2mworldnews.com/2013/09/18/27009-idateforecasts-80-billion-things-connected-in-2020/
2 J. Rivera, R. Meulen, "Gartner's 2013 Hype Cycle for Emerging Technologies Maps Out Evolving Relationship Between Humans and Machines", Gartner Newsroom , 2013, http://www.gartner.com/newsroom/id/2575515
3 Technical Report, "Security in the Internet of Things", Wind River Systems (2015)
4 Barcena, Mario Ballano, and Candid Wueest. "Insecurity in the Internet of Things." Security Response, Symantec (2015).
5 Viewpoint Paper, "Securing the Internet of Things -Explore Security and Privacy in an Interconnected World", Hewlett Packard Enterprise (2015)
6 White Paper, "Bootstrapping Security", Ericsson (2016)
7 ONF, "Software-Defined Networking: The New Norm for Networks", Open Networking Foundation, 2012
8 ETSI,"Network Function Virtualisation", Introductory White Paper, 2013
9 Mirai. https://www.incapsula.com/blog/malwareanalysis-mirai-ddos-botnet.html
10 Docker. https://www.docker.com/
11 Tensorflow. https://www.tensorflow.org/
12 D. Ma, and G. Tsudik. "A new approach to secure logging", In ACM Transactions on Storage (TOS), 5(1), pp. 1-21, 2009.
13 S. A. Crosby, and D. S. Wallach. "Efficient Data Structures for Tamper-Evident Logging", In Proceedings of the USENIX Security Symposium, 2009.
14 ARM Trusted Firmware, https://github.com/ARMsoftware/arm-trusted-firmware
15 ARM TrustZone, https://www.arm.com/products/security-on-arm/trustzone
16 Hikey Board, http://www.96boards.org/product/hikey/
17 S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad. Proposed security model and threat taxonomy for the internet of things (iot). In Recent Trends in Network Security and Applications, pages 420-429. Springer, 2010.
18 A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah. A systemic approach for iot security. In Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on, pages 351- 355. IEEE, 2013.
19 Cisco Systems Inc. Cisco 910 Industrial Router. http://www.cisco.com/c/en/us/support/routers/910-industrial-router/model.html
20 J. Maguire. Internet of Things (IoT) Service Delivery using NFV/SDN. Freescale Technology Forum 2014. FTF-NET-F0160.
21 T. Yu, V. Sekar, S. Seshan, Y. Agarwal, and C. Xu. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV, 2015
22 Asokan, N and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos V and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian. "Mobile Trusted Computing", 2014. Proceedings of the IEEE, pp. 1189-1206.
23 J.-E. Ekberg, K. Kostiainen, and N. Asokan. "The untapped potential of trusted execution environments on mobile devices", 2014. IEEE Security Privacy Mag., DOI: 10.1109/MSP.2014.38.   DOI
24 ChaCha20, https://tools.ietf.org/html/rfc7539