SIOT: Secure Gateway for Internet of Things |
Kim, Yeon-Geun
(한국과학기술원)
Go, Yeong-Hwan (한국과학기술원) Kim, Min-Su (한국과학기술원) Jang, Jin-Su (한국과학기술원) Bae, Sang-Uk (한국과학기술원) No, Ju-Hwan (한국과학기술원) Gang, Byeong-Hun (한국과학기술원) Park, Gyeong-Su (한국과학기술원) Kim, Yong-Dae (한국과학기술원) Sin, Seung-Won (한국과학기술원) |
1 | M2M.World.News, "IDATE forecasts 80 Billion things connected in 2020", M2M World News, 2013, http://m2mworldnews.com/2013/09/18/27009-idateforecasts-80-billion-things-connected-in-2020/ |
2 | J. Rivera, R. Meulen, "Gartner's 2013 Hype Cycle for Emerging Technologies Maps Out Evolving Relationship Between Humans and Machines", Gartner Newsroom , 2013, http://www.gartner.com/newsroom/id/2575515 |
3 | Technical Report, "Security in the Internet of Things", Wind River Systems (2015) |
4 | Barcena, Mario Ballano, and Candid Wueest. "Insecurity in the Internet of Things." Security Response, Symantec (2015). |
5 | Viewpoint Paper, "Securing the Internet of Things -Explore Security and Privacy in an Interconnected World", Hewlett Packard Enterprise (2015) |
6 | White Paper, "Bootstrapping Security", Ericsson (2016) |
7 | ONF, "Software-Defined Networking: The New Norm for Networks", Open Networking Foundation, 2012 |
8 | ETSI,"Network Function Virtualisation", Introductory White Paper, 2013 |
9 | Mirai. https://www.incapsula.com/blog/malwareanalysis-mirai-ddos-botnet.html |
10 | Docker. https://www.docker.com/ |
11 | Tensorflow. https://www.tensorflow.org/ |
12 | D. Ma, and G. Tsudik. "A new approach to secure logging", In ACM Transactions on Storage (TOS), 5(1), pp. 1-21, 2009. |
13 | S. A. Crosby, and D. S. Wallach. "Efficient Data Structures for Tamper-Evident Logging", In Proceedings of the USENIX Security Symposium, 2009. |
14 | ARM Trusted Firmware, https://github.com/ARMsoftware/arm-trusted-firmware |
15 | ARM TrustZone, https://www.arm.com/products/security-on-arm/trustzone |
16 | Hikey Board, http://www.96boards.org/product/hikey/ |
17 | S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad. Proposed security model and threat taxonomy for the internet of things (iot). In Recent Trends in Network Security and Applications, pages 420-429. Springer, 2010. |
18 | A. Riahi, Y. Challal, E. Natalizio, Z. Chtourou, and A. Bouabdallah. A systemic approach for iot security. In Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on, pages 351- 355. IEEE, 2013. |
19 | Cisco Systems Inc. Cisco 910 Industrial Router. http://www.cisco.com/c/en/us/support/routers/910-industrial-router/model.html |
20 | J. Maguire. Internet of Things (IoT) Service Delivery using NFV/SDN. Freescale Technology Forum 2014. FTF-NET-F0160. |
21 | T. Yu, V. Sekar, S. Seshan, Y. Agarwal, and C. Xu. Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks, HotNets-XIV, 2015 |
22 | Asokan, N and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos V and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian. "Mobile Trusted Computing", 2014. Proceedings of the IEEE, pp. 1189-1206. |
23 | J.-E. Ekberg, K. Kostiainen, and N. Asokan. "The untapped potential of trusted execution environments on mobile devices", 2014. IEEE Security Privacy Mag., DOI: 10.1109/MSP.2014.38. DOI |
24 | ChaCha20, https://tools.ietf.org/html/rfc7539 |
![]() |