Sie sind auf Seite 1von 54

Rese

Year Title

Privacy-Preserving Computation of Disease Risk by Using Genomic,


2013
Clinical, and Environmental Data

Understanding the Challenges with


2013
Medical Data Segmentation for Privacy

WattsUpDoc: Power Side Channels to Nonintrusively Discover


2013
Untargeted Malware on Embedded Medical Devices

Requirements and Design for an


2013
Extensible Toolkit for Analyzing EMR Audit Logs

Using Bowel Sounds to Create a Forensically-aware Insulin Pump


2013
System

2013 Capability Exchange: Improving Access Control Usability in Health IT

2013 A Security Protocol for Information-Centric Networking in Smart Grids

DLMS/COSEM Security Level Enhancement to Construct Secure


2013
Advanced Metering Infrastructure

2013 Securing ZigBee Smart Energy Profile 1.x with OpenECC Library

2013 Detecting Intrusions in Encrypted Control Traffic

Semantic Security Analysis of SCADA Networks to Detect Malicious


2013
Control Commands in Power Grids
A Distributed Monitoring Architecture for AMIs: Minimizing the Number
2013
of Monitoring Nodes and Enabling Collided Packet Recovery

Protection of Consumer Data in the Smart Grid Compliant with the


2013
German Smart Metering Guideline

Customer-centric Energy Usage Data Management and Sharing in


2013
Smart Grid Systems

2013 Smart Meter Aggregation via Secret-Sharing

2013 A Formal Model for Sustainable Vehicle-to-Grid Management

2014 Privacy-Friendly Planning of Energy Distribution in Smart Grids

2014 Privacy Enhanced Personal Services for Smart Grids

argeted Attacks against Industrial Control Systems: Is the Power


2014
Industry Prepared?

2014 Adaptive Defending Strategy for Smart Grid Attacks

2014 eFuzz: A Fuzzer for DLMS/COSEM Electricity Meters

An Empirical Study of TCP Vulnerabilities in Critical Power System


2014
Devices
2014 Challenges in Remote Attestation of Low-End Embedded Devices

6LoWPAN Security: Avoiding Hidden Wormholes using Channel


2014
Reciprocity

2014 Challenges of Establishing Trust in Online Entities and Beyond

Security of CCTV and Video Surveillance Systems:Threats,


2016
Vulnerabilities, Attacks, and Mitigations

2015 BALSA: Bluetooth Low Energy Application Layer Security Add-on

2015 Secure Association for the Internet of Things

2015 REST-ful CoAP Message Authentication

Access Control for Apps Running on Constrained Devices in the Internet


2014
of Things

2014 Federated Identity and Access Management for the Internet of Things

2014 Lightweight Display Virtualization For Mobile Devices

2014 A Novel Key Generating Architecture for Wireless Low-Resource Devices

UNCHAIN - Ubiquitous Wireless Network Communication Architecture


2014
for Ambient Intelligence and Health Scenarios

Mobile Malware and Smart Device Security: Trends,Challenges and


2013
Solutions
2013 Trust Mechanisms for Multi-owner Wireless Sensor Networks

2013 Detecting and Analyzing Zero-Day Attacks Using Honeypots

2013 IARCrypto

2012 Inference Detection and Database Security for a Business Environment

A Comparative Evaluation of Private Information Retrieval Techniques


2012
in Location-Based Services

2012 Securing Virtual Networks for Multi-owner Wireless Sensor Networks

2012 Adaptive Security Framework for Wireless Sensor Networks

An ultra-lightweight white-box Encryption Scheme for Resource-


2016
constrained IoT Devices

A Multi-Cloud Privacy-Preserving Data Publishing Scheme For the


2016
Internet of Things

Using Channel State Information for Tamper Detection in the Internet of


2015
Things

2015 Using Visual Challenges to Verify the intergrity of Security Cameras


2014 Market Analysis of Attacks Against Demand Reponse in Smart Grid

Taking Two-Factor to the Next Level Protecting Online Poker banking


2014
Healthcare and Other Applications

Verified Computational Differential Privacy with Applications to Smart


2013
Metering

Formal Analysis for Dependable Supervisory Control and Data


2016
Acqusition in Smart Grids

2016 A Framework for Detecting Electricity Theft Attacks in Smart Grids

2015 Smart TV Analysis Practical Experiments

2016 A Lightweight Authentication Protocol for CAN

2016 Privacy,Discovery,and Authentication for the Internet of Things

Authenticated Key Argeement Mediated By a Proxy Re-Encryptor for the


2016
internet of Things

2014 A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks

2012 PRIVATUS Wallet-Friendly Privacy Protection for Smart Meters


2013 Differentially Private Smart Metering with Battery Recharging

Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service


2015
Weakness in Web Services

2015 A WirelessHART SCADA-Based Wireless Sensor Networks Simulator

Lightweight and Flexible Trust Assessment Modules for the Internet of


2015
Things

Practical Privacy Preserving Cloud Resource-Payment for Constrained


2012
Clients

2012 Evaluating Electricity Theft Detectors in Smart Grid Networks

KEH-Gait: Towards a Mobile Healthcare User Authentication System by


2017
Kinetic Energy Harvesting

ContexIoT: Towards Providing Contextual Integrity to Appified IoT


2017
Platforms

SKEE: A Lightweight Secure Kernel-level Execution Environment for


2016
ARM

SMART Secure and Minimal Architecture for (Establishing Dynamic)


2012
Root of Trust
FlowFence: Practical Data Protection for Emerging IoT Application
2016
Frameworks

2014 A Large-Scale Analysis of the Security of Embedded Firmwares

Body Area Network Security:Robust Key Establishment Using Human


2012
Body Channel

2011 Adaptive security and privacy for mHealth sensing

2016 Security Analysis of Emerging Smart Home Applications

2016 Is Anybody Home? Inferring Activity From Smart Home Network Traffic

2016 Privacy Harm Analysis: A Case Study on Smart Grids

Slender PUF Protocol : A lightweight , robust , and secure


2012
authentication by substring matching

POSTER: Computations on Encrypted Data in the Internet of Things


2015
Applications

2013 Configuration-based IDS for Advanced Metering Infrastructure

DEMO: An IDS Framework for Internet of Things Empowered by


2013
6LoWPAN

2012 Minimizing private data disclosures in the smart grid


2016 High-Performance and Lightweight Lattice-Based Public-Key Encryption

2016 Physical Unclonable Functions for IoT Security

Trusted Sensors for Participatory Sensing and IoT Applications based on


2016
Physically Unclonable Functions

Analyzing the Security and Privacy of Cloud-based Video Surveillance


2016
Systems

Cloud-Based Commissioning of Constrained Devices using


2016
Permissioned Blockchains

Privilege-Based Remote Attestation: Towards Integrity Assurance for


2015
Lightweight Clients

2015 A Secure Automobile Information Sharing System

2015 The Fairy-Ring Dance:Password Authenticated Key Exchange in a Group

2015 Lightweight Protection of Group Content Distribution

Anonymous authentication for privacy-preserving IoT target-driven


2013
applications

2013 Monitoring information security risks within health care

2013 Smart control of operational threats in control substations


Trust management system design for the Internet of Things: A context-
2013
aware and multiservice approach

Insecurity of an anonymous authentication for privacy-preserving IoT


2015
target-driven applications

2015 SecKit: A Model-based Security Toolkit for the Internet of Things

PRAC: Efficient privacy protection for vehicle-to-grid communications in


2016
the smart grid

2017 Diet-ESP: IP layer security for IoT

PRGA: Privacy-Preserving Recording & Gateway-Assisted Authentication


2013
of Power Usage Information for Smart Grid

Camouflage Traffic: Minimizing Message Delay for Smart Grid


2014
Applications under Jamming

2015 Trust-Based Service Management for Social Internet of Things Systems

Secure and Private Data Aggregation for Energy Consumption


2016
Scheduling in Smart Grids

Anonymous Secure Framework in Connected Smart Home


2016
Environments

Light-Weight and Robust Security-Aware D2D-Assist Data Transmission


2015
Protocol for Mobile-Health Systems

Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart


2016
Grids
Q-Learning-Based Vulnerability Analysis of Smart Grid Against
2015
Sequential Topology Attacks

Authentication and Authorization Scheme for Various User Roles and


2015
Devices in Smart Grid

DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in


2015
Smart Grid Cyber-Physical System

Exploring the Usefulness of Light Field Cameras for Biometrics: An


2015
Empirical Study on Face and Iris Recognition

Smart Meter Privacy for Multiple Users in the Presence of an Alternative


2013
Energy Source

TPP: Traceable Privacy-Preserving Communication and Precise Reward


2014
for Vehicle-to-Grid Networks in Smart Grids

From Physical to Cyber:Escalating Protection for Personalized Auto


2016
Insurance

A Distributed Publisher-Driven Secure Data Sharing Scheme for


2017
Information-Centric IoT

A Hypothesis Testing Approach for Topology Error Detection in Power


2016
Grids

2017 A Privacy-Preserving Data-Sharing Framework for Smart Grid

A Secure and Efficient ECQV Implicit Certificate Issuance Protocol for


2017
the Internet of Things Applications
A Secure and Efficient ID-Based Aggregate
2017
Signature Scheme for Wireless Sensor Networks

A Secure Mechanism for Big Data Collection


2017
in Large Scale Internet of Vehicle

Achieving Efficient and Secure Data Acquisition for Cloud-supported


2017
Internet of Things in Smart Grid

An Energy-Efficient Region-Based RPL Routing Protocol for Low-Power


2016
and Lossy Networks

An Obfuscatable Aggregatable Signcryption Scheme for Unattended


2017
Devices in IoT Systems

Anonymous Authentication for Wireless Body Area Networks With


2016
Provable Security

BLITHE: Behavior Rule-Based Insider Threat


2016
Detection for Smart Grid

BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body


2016
Sensor Network

Context-Aware Dynamic Resource Allocation


2016
for Cellular M2M Communications

Countering Intelligent-Dependent Malicious Nodes in Target Detection


2016
Wireless Sensor Networks

Deceptive Attack and Defense Game in


2016 Honeypot-Enabled Networks for
the Internet of Things

Empirical Study and Enhancements of Industrial Wireless Sensor-


2017
Actuator Network Protocols
EPLQ: Efficient Privacy-Preserving Location-Based Query Over
2016
Outsourced Encrypted Data

Facilitating the Delegation of Use for Private Devices in the Era of the
2016
Internet of Wearable Things

Fast Hierarchical Key Management Scheme With Transitory Master Key


2016
for Wireless Sensor Networks

Follow But No Track: Privacy Preserved Profile Publishing in Cyber-


2017
Physical Social Systems

Ghost-in-ZigBee: Energy Depletion Attack on


2016
ZigBee-Based Wireless Networks

IoT Interoperability - On-demand and low latency Transparent Multi-


2017
protocol Translator

Mutual Authentication in IoT Systems using Physical Unclonable


2017
Functions

Network Coding in Heterogeneous Multicore IoT Nodes with DAG


2017
Scheduling of Parallel Matrix Block Operations

Privacy-Preserving Mechanisms for Crowdsensing: Survey and Research


2016
Challenges

Privacy-Preserving Power Injection over a


2016
Hybrid AMI/LTE Smart Grid Network

Privacy-Preserving Ride Sharing Scheme for


2017
Autonomous Vehicles in Big Data Era
Privacy-Preserving Verifiable Set Operation in Big Data for Cloud-
2017
Assisted Mobile Crowdsourcing

Real-Time Monitoring via Patch-Type Piezoelectric Force Sensors for


2017
Internet of Things Based Logistics

Reliable and Efficient Access for Alarm-Initiated and Regular M2M Traffic
2016
in IEEE 802.11ah Systems

RMER: Reliable and Energy-Efficient Data


2016
Collection for Large-Scale Wireless Sensor Networks

S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device


2017
Authentication Protocol

Scalable and Reliable IoT Enabled by Dynamic Spectrum Management


2016
for M2M in LTE-A

SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-


2016
Preserving and Context-Aware Smart Applications

Secure Data Obfuscation Scheme to Enable Privacy-Preserving State


2016
Estimation in Smart Grid AMI Networks

2016 Secure In-Band Bootstrapping for Wireless Personal Area Networks

Secure Object Tracking Protocol for


2016
the Internet of Things

Secure Service Virtualization in IoT by Dynamic Service Dependency


2016
Verification

2017 Secure, LTE-based V2X Service

2016 Security Access Protocols in IoT Capillary Networks


Security, Privacy, and Incentive Provision for
2016
Mobile Crowd Sensing Systems

Security-Aware Waveforms for Enhancing Wireless Communications


2017
Privacy in Cyber-Physical Systems via Multipath Receptions

Tackling Mobility in Low Latency Deterministic


2016
Multihop IEEE 802.15.4e Sensor Network

Toward a Gaussian-Mixture Model-Based Detection Scheme Against


2017
Data Integrity Attacks in the Smart Grid

Twenty Security Considerations for


2016
Cloud-Supported Internet of Things

2016 Functional Credentials for Internet of Thing

Ultra-Compact and Robust Physically Unclonable Function Based on


2016 Voltage-Compensated Proportional-to-Absolute-Temperature Voltage
Generators

Sur
2015 IoT Security & Privacy: Threats and Challenges

On the Security and Privacy of Internet of Things Architectures and


2015
Systems

2015 A Plea for Incremental Work in IoT Security

An Overview of Automotive Cybersecurity: Challenges and Solution


2015
Approaches

2016 IoT Security Challenges and Ways Forward


2017 A Survey on Security and Privacy Issues in Internet-of-Things

2017 Internet of Vehicles: Architecture, Protocols, and Security

A Survey on Internet of Things: Architecture, Enabling Technologies,


2017
Security and Privacy, and Applications

2017 IoT Middleware: A Survey on Issues and Enabling Technologies

2017 General Theory of Security and a Study Case in Internet of Things

2016 The internet of things: a security point of view

2015 Security, privacy and trust in Internet of Things: The road ahead

2015 Security, Privacy and Trust in Internet of Things:A Straight Road


2014 Internet_of_Things_Top_Ten

2013 On the features and challenges of security and privacy

2013 A Survey on the Internet of Things Security

2016 Connectivity Frameworks for Smart Devices


Research paper
Threats Applications Layers

Application
Digital logic, Data to
Privacy Leaks
Healthcare decision often
in the cloud

Application
Digital logic, Data to
Privacy Leaks
Healthcare decision often
in the cloud

Vulnerable
Digital
Embedded Sensing
Healthcare
System/Firmware

Application
Insufficient Security Digital logic, Data to
Configurability Healthcare decision often
in the cloud

Insufficient Security Digital


Sensing
Configurability Healthcare

Actuation,
Insufficient Security Digital
Command and
Access Control Healthcare
Control
Insecure Network
Communication/Proto Smart Grid Transfer
col
Insecure Network
Communication/Proto Smart Grid Transfer
col
Insecure Network
Communication/Proto Smart Grid Transfer
col
Insecure Network Actuation,
Communication/Proto Smart Grid Command and
col Control

Insecure Network Actuation,


Smart
Communication/Proto Command and
Manufacturing
col Control
Application
Insecure Network
logic, Data to
Communication/Proto Smart Grid
decision often
col
in the cloud

Privacy Leaks Smart Grid Transfer

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Application
Insecure Network
logic, Data to
Communication/Proto Smart Grid
decision often
col
in the cloud

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Vulnerable
Smart
Embedded /
Manufacturing
System/Firmware

Application
logic, Data to
Others Smart Grid
decision often
in the cloud

Actuation,
Others Smart Grid Command and
Control
Insecure Network
Communication/Proto Smart Grid /
col
Vulnerable
Embedded Others Sensing
System/Firmware
Insecure Network
Communication/Proto Others Transfer
col
Actuation,
Vulnerable
Others Command and
Cloud/Web Service
Control

Vulnerable
Smart
Embedded /
Manufacturing
System/Firmware

Insecure Network
Communication/Proto Bluetooth Transfer
col

Insufficient Security
Others Transfer
Authentication

Insecure Network
Communication/Proto Others Transfer
col

Digital Actuation,
Insecure Mobile
Healthcare/Smar Command and
Application
t Manufacturing Control

Actuation,
Insufficient Security
Others Command and
Authentication
Control

Application
Vulnerable
logic, Data to
Embedded Others
decision often
System/Firmware
in the cloud

Insecure Network
Communication/Proto Others Transfer
col

Insecure Network
Digital
Communication/Proto Transfer
Healthcare
col

Insecure Mobile
Smart Home Transfer
Application
Insecure Network Actuation,
Wireless Sensor
Communication/Proto Command and
Networks
col Control

Others Others Transfer

Application
Insecure Mobile logic, Data to
Smart Home
Application decision often
in the cloud

Application
Vulnerable logic, Data to
Database
Cloud/Web Service decision often
in the cloud

Application
logic, Data to
Privacy Leaks Smart Home
decision often
in the cloud

Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col

Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col

Application
Vulnerable
logic, Data to
Embedded Others
decision often
System/Firmware
in the cloud

Vulnerable Application
Cloud/Web logic, Data to
Others
Service/Privacy decision often
Leaks in the cloud

Insecure Network
Communication/Proto Others Transfer
col

Others Smart Home Sensing


Others Smart Grid /

Application
Smart
Insecure Mobile logic, Data to
Home/Digital
Application decision often
Healthcare
in the cloud

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Insecure Network Actuation,


Communication/Proto Smart Home Command and
col Control

Application
logic, Data to
Others Smart Home
decision often
in the cloud

Actuation,
Insufficient Security
Smart Vehicles Command and
Authentication
Control

Application
logic, Data to
Privacy Leaks Others
decision often
in the cloud

Insecure Network
Communication/Proto Others Transfer
col

Insecure Network
Communication/Proto Others Transfer
col

Privacy Leaks Smart Meter Sensing


Application
logic, Data to
Privacy Leaks Smart Meter
decision often
in the cloud

Insecure Network Actuation,


Communication/Proto Others Command and
col Control

Insecure Network
Smart
Communication/Proto Transfer
Manufacturing
col

Actuation,
Others Others Command and
Control

Vulnerable Application
Cloud/Web logic, Data to
Smart Home
Service/Privacy decision often
Leaks in the cloud

Application
Insecure Network
logic, Data to
Communication/Proto Smart Grid
decision often
col
in the cloud

Application
Insufficient Security Digital logic, Data to
Authentication Healthcare decision often
in the cloud

Application
Insecure Mobile logic, Data to
Smart Home
Application decision often
in the cloud

Vulnerable Digital Actuation,


Embedded Healthcare/Smar Command and
System/Firmware t Manufacturing Control

Vulnerable Digital Actuation,


Embedded Healthcare/Smar Command and
System/Firmware t Manufacturing Control
Application
Insecure Mobile
logic, Data to
Application/Privacy Smart Home
decision often
Leaks
in the cloud

Vulnerable
Embedded Others Sensing
System/Firmware

Insufficient Security Digital


Transfer
Authentication Healthcare

Digital
Privacy Leaks Transfer
Healthcare

Application
Insecure Mobile logic, Data to
Smart Home
Application decision often
in the cloud

Insecure Network
Communication/Proto Smart Home Transfer
col

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Application
Insecure Physical logic, Data to
Others
Environment decision often
in the cloud

Smart
Privacy Leaks Home/Digital Transfer
Healthcare

Insecure Network Actuation,


Communication/Proto Smart Grid Command and
col Control

Insecure Network Actuation,


Communication/Proto Others Command and
col Control

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Vulnerable
Embedded Others Transfer
System/Firmware

Others Others Sensing

Application
Insecure Mobile logic, Data to
Others
Application decision often
in the cloud

Application
Vulnerable logic, Data to
Smart Home
Cloud/Web Service decision often
in the cloud

Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud

Actuation,
Insecure Mobile
Others Command and
Application
Control

Vulnerable
Smart Vehicles Transfer
Cloud/Web Service

Insecure Network
Communication/Proto Others Transfer
col

Insecure Network
Communication/Proto Others Transfer
col

Application
Insecure Mobile
logic, Data to
Application/Privacy Smart Home
decision often
Leaks
in the cloud

Application
Digital logic, Data to
Others
Healthcare decision often
in the cloud

Actuation,
Insufficient Security
Smart Grid Command and
Configurability
Control
Actuation,
Vulnerable
Others Command and
Cloud/Web Service
Control

Insecure Mobile
Smart Home Transfer
Application

Application
Smart
logic, Data to
Privacy Leaks Home/Digital
decision often
Healthcare
in the cloud

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Insecure Network
Communication/Proto Others Transfer
col

Privacy Leaks Smart Grid Transfer

Insecure Network
Communication/Proto Smart Grid Transfer
col
Vulnerable Actuation,
Embedded Others Command and
System/Firmware Control

Privacy Leaks Smart Grid Transfer

Application
Insufficient Security logic, Data to
Smart Home
Configurability decision often
in the cloud

Insecure Network
Digital
Communication/Proto Transfer
Healthcare
col

Privacy Leaks Smart Grid Sensing


Insecure Network
Communication/Proto Smart Grid Transfer
col

Actuation,
Insufficient Security
Smart Grid Command and
Authentication
Control

Application
Insecure Network
logic, Data to
Communication/Proto Smart Grid
decision often
col
in the cloud

Others Smart Home Sensing

Privacy Leaks Smart Grid Sensing

Privacy Leaks Smart Grid Transfer

Insecure Network
Communication/Proto Smart Vehicles Transfer
col

Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud

Application
logic, Data to
Others Smart Grid
decision often
in the cloud

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Insecure Mobile
Smart Home Transfer
Application
Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col

Application
logic, Data to
Privacy Leaks Smart Vehicles
decision often
in the cloud

Application
Vulnerable logic, Data to
Smart Grid
Cloud/Web Service decision often
in the cloud

Insecure Network Digital


Communication/Proto Healthcare/Smar Transfer
col t Manufacturing

Digital
Others Healthcare/Smar Sensing
t Manufacturing

Insecure Network
Digital
Communication/Proto Transfer
Healthcare
col
Insecure Network Actuation,
Communication/Proto Smart Grid Command and
col Control
Insecure Network
Digital
Communication/Proto Transfer
Healthcare
col
Insecure Network
Communication/Proto Others Transfer
col

Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col

Insecure Network
Communication/Proto Others Transfer
col
Insecure Network
Smart
Communication/Proto Transfer
Manufacturing
col
Application
logic, Data to
Privacy Leaks Others
decision often
in the cloud

Application
logic, Data to
Others Smart Home
decision often
in the cloud

Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col

Application
logic, Data to
Privacy Leaks Others
decision often
in the cloud

Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col
Insecure Network
Smart
Communication/Proto Transfer
Manufacturing
col

Others Others Transfer

Actuation,
Smart
Others Command and
Manufacturing
Control

Application
logic, Data to
Privacy Leaks Others
decision often
in the cloud

Insecure Network
Communication/Proto Smart Grid Transfer
col

Application
logic, Data to
Privacy Leaks Smart Vehicles
decision often
in the cloud
Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud

Insufficient Security Smart


Sensing
Configurability Manufacturing

Insecure Network
Communication/Proto Others Transfer
col

Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col
Insecure Network
Communication/Proto Others Sensing
col
Insecure Network
Communication/Proto Others Transfer
col

Application
Insecure Mobile logic, Data to
Smart Home
Application decision often
in the cloud

Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud

Insecure Network
Communication/Proto Others Transfer
col

Others Others Transfer

Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud

Insecure Network
Communication/Proto Smart Vehicles Transfer
col
Insecure Network
Communication/Proto Smart City Transfer
col
Application
Insufficient Security logic, Data to
Smart City
Configurability decision often
in the cloud

Smart
Privacy Leaks Transfer
Manufacturing

Application
Insecure Network
logic, Data to
Communication/Proto Smart Vehicles
decision often
col
in the cloud

Insecure Network Actuation,


Communication/Proto Smart Grid Command and
col Control

Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud

Others Others /

Application
logic, Data to
Others Others
decision often
in the cloud

Survey paper
/ / /

/ / /

/ / /

/ Smart Vehicles /

/ / /
/ / /

/ Smart Vehicles /

/ / /

/ / /

/ / /

/ / /

/ / /

/ / /
/ / /

/ / /

/ / /

/ / /
References

Ayday E, Raisaro J L, Mclaren P J, et al. Privacy-preserving computation


of disease risk by using genomic, clinical, and environmental data[C]//
Usenix Conference on Safety, Security, Privacy and Interoperability of
Health Information Technologies. USENIX Association, 2013:1-1.

Chan E M, Lam P E, Mitchell J C. Understanding the challenges with


medical data segmentation for privacy[C]// Usenix Conference on
Safety, Security, Privacy and Interoperability of Health Information
Technologies. USENIX Association, 2013:2-2.

Clark S S, Ransford B, Rahmati A, et al. WattsUpDoc: power side


channels to nonintrusively discover untargeted malware on embedded
medical devices[C]// Usenix Conference on Safety, Security, Privacy and
Interoperability of Health Information Technologies. USENIX Association,
2013:9-9.

Eric Duffy, Steve Nyemba, Carl A. Gunter, et al.Requirements and


Design for an Extensible Toolkit for Analyzing EMR Audit Logs[C]//
Usenix Conference on Safety, Security, Privacy and Interoperability of
Health Information Technologies. USENIX Association, 2013:6-6.

Henry N L, Paul N R, Mcfarlane N. Using bowel sounds to create a


forensically-aware insulin pump system[C]// Usenix Conference on
Safety, Security, Privacy and Interoperability of Health Information
Technologies. USENIX Association, 2013:8-8.

Qin C, Freebairn E, Smith S. Capability Exchange: Improving Access


Control Usability in Health IT[J]. 2013.

Bárbara Vieira, Poll E. A security protocol for information-centric


networking in smart grids[C]// ACM Workshop on Smart Energy Grid
Security. ACM, 2013:1-10.
Choi J, Shin I. DLMS/COSEM security level enhancement to construct
secure advanced metering infrastructure[C]// ACM Workshop on Smart
Energy Grid Security. ACM, 2013:11-16.
Fan X, Gong G. Securing ZigBee smart energy profile 1.x with OpenECC
library[C]// ACM Workshop on Smart Energy Grid Security. ACM,
2013:17-22.

Hoeve M. Detecting intrusions in encrypted control traffic[C]// ACM


Workshop on Smart Energy Grid Security. ACM, 2013:23-28.

Lin H, Slagell A, Kalbarczyk Z, et al. Semantic security analysis of SCADA


networks to detect malicious control commands in power grids[C]// ACM
Workshop on Smart Energy Grid Security. ACM, 2013:29-34.
Shin I, Huh J H, Jeon Y, et al. A distributed monitoring architecture for
AMIs: minimizing the number of monitoring nodes and enabling collided
packet recovery[C]// ACM Workshop on Smart Energy Grid Security.
ACM, 2013:35-40.

Biselli A, Franz E. Protection of consumer data in the smart grid


compliant with the German smart metering guideline[C]// ACM
Workshop on Smart Energy Grid Security. ACM, 2013:41-52.

Lahoti G, Mashima D, Chen W P. Customer-centric energy usage data


management and sharing in smart grid systems[C]// ACM Workshop on
Smart Energy Grid Security. ACM, 2013:53-64.

Danezis G, Fournet C, dric, et al. Smart meter aggregation via secret-


sharing[C]// ACM Workshop on Smart Energy Grid Security. ACM,
2013:75-80.

Rahman M A, Mohsen F, Al-Shaer E. A formal model for sustainable


vehicle-to-grid management[C]// ACM Workshop on Smart Energy Grid
Security. ACM, 2013:81-92.

Dimitriou T, Karame G. Privacy-Friendly Planning of Energy Distribution


in Smart Grids[C]// The Workshop on Smart Energy Grid Security. ACM,
2014:1-6.

Erkin Z, Veugen T. Privacy Enhanced Personal Services for Smart


Grids[C]// The Workshop on Smart Energy Grid Security. ACM, 2014:7-
12.

Line M B, Zand A, Stringhini G, et al. Targeted Attacks against Industrial


Control Systems:Is the Power Industry Prepared?[C]// The Workshop on
Smart Energy Grid Security. ACM, 2014:13-22.

Hao J, Kang E, Jackson D, et al. Adaptive Defending Strategy for Smart


Grid Attacks[C]// The Workshop on Smart Energy Grid Security. ACM,
2014:23-30.

Dantas H, Erkin Z, Doerr C, et al. eFuzz:A Fuzzer for DLMS/COSEM


Electricity Meters[C]// The Workshop on Smart Energy Grid Security.
ACM, 2014:31-38.
Formby D, Sang S J, Copeland J, et al. An Empirical Study of TCP
Vulnerabilities in Critical Power System Devices[C]// The Workshop on
Smart Energy Grid Security. ACM, 2014:39-44.
Tsudik G. Challenges in Remote Attestation of Low-End Embedded
Devices[C]// International Workshop on Trustworthy Embedded Devices.
ACM, 2014:1-1.
Krentz K F, Wunder G. 6LoWPAN Security:Avoiding Hidden Wormholes
using Channel Reciprocity[C]// International Workshop on Trustworthy
Embedded Devices. ACM, 2014:13-22.
Kim H J. Challenges of Establishing Trust in Online Entities and
Beyond[C]// International Workshop on Trustworthy Embedded Devices.
ACM, 2014:49-49.
Costin A. Security of CCTV and Video Surveillance Systems: Threats,
Vulnerabilities, Attacks, and Mitigations[C]//Proceedings of the 6th
International Workshop on Trustworthy Embedded Devices. ACM, 2016:
45-54.
Ortiz-Yepes D A. BALSA: Bluetooth Low Energy Application Layer Security
Add-on[C]// International Workshop on Secure Internet of Things. IEEE,
2015:15-24.
Benin A, Toledo S, Tromer E. Secure Association for the Internet of
Things[M]// The international gold standard reinterpreted, 1914-1934 /.
National Bureau of Economic Research, 2015:25-34.

Nguyen H V, Iacono L L. REST-ful CoAP Message Authentication[C]//


International Workshop on Secure Internet of Things. IEEE, 2015:35-43.

Mituca A, Moin A H, Prehofer C. Access Control for Apps Running on


Constrained Devices in the Internet of Things[C]// International
Workshop on Secure Internet of Things. 2014:1-9.

Fremantle P, Aziz B, Kopecký J, et al. Federated Identity and Access


Management for the Internet of Things[C]// International Workshop on
Secure Internet of Things. IEEE, 2014:10-17.

Carabas M, Mogosanu L, Deaconescu R, et al. Lightweight Display


Virtualization For Mobile Devices[C]// International Workshop on Secure
Internet of Things. IEEE, 2014:18-25.

Zenger C T, Chur M J, Posielek J F, et al. A Novel Key Generating


Architecture for Wireless Low-Resource Devices[C]// International
Workshop on Secure Internet of Things. IEEE, 2014:26-34.
Rosner D, Tataroiu R, Gheorghe L, et al. UNCHAIN - Ubiquitous Wireless
Network Communication Architecture for Ambient Intelligence and
Health Scenarios[C]// International Workshop on Secure Internet of
Things. IEEE, 2014:44-51.
Arabo A, Pranggono B. Mobile Malware and Smart Device Security:
Trends, Challenges and Solutions[C]// International Conference on
Control Systems and Computer Science. IEEE Computer Society,
2013:526-531.
Vasilache R A, Gavrila I C, Grigorescu A C, et al. Trust Mechanisms for
Multi-owner Wireless Sensor Networks[C]// International Conference on
Control Systems and Computer Science. IEEE, 2013:537-542.

Musca C, Mirica E, Deaconescu R. Detecting and Analyzing Zero-Day


Attacks Using Honeypots[C]// International Conference on Control
Systems and Computer Science. IEEE Computer Society, 2013:543-548.

Velea R, Tapus N, Bardac M. IARCrypto[C]// International Conference on


Control Systems and Computer Science. IEEE Computer Society,
2013:555-559.

Popeea T, Constantinescu A, Gheorghe L, et al. Inference Detection and


Database Security for a Business Environment[C]// International
Conference on Intelligent NETWORKING and Collaborative Systems.
IEEE, 2012:612-617.

Costea S, Barbu D M, Ghinita G, et al. A Comparative Evaluation of


Private Information Retrieval Techniques in Location-Based Services[C]//
International Conference on Intelligent NETWORKING and Collaborative
Systems. IEEE, 2012:618-623.

Gheorghe L, Tudose D, Wehner M, et al. Securing Virtual Networks for


Multi-owner Wireless Sensor Networks[C]// International Conference on
Intelligent NETWORKING and Collaborative Systems. IEEE, 2012:630-
635.
Gheorghe L, Rughinis R, Tapus N. Adaptive Security Framework for
Wireless Sensor Networks[C]// Fourth International Conference on
Intelligent NETWORKING and Collaborative Systems. IEEE Computer
Society, 2012:636-641.

Shi Y, Wei W, He Z, et al. An ultra-lightweight white-box encryption


scheme for securing resource-constrained IoT devices[C]// Conference
on Computer Security Applications. ACM, 2016:16-29.

Yang L, Humayed A, Li F. A multi-cloud based privacy-preserving data


publishing scheme for the internet of things[C]// Conference on
Computer Security Applications. ACM, 2016:30-39.

Bagci I E, Roedig U, Martinovic I, et al. Using Channel State Information


for Tamper Detection in the Internet of Things[C]// Computer Security
Applications Conference. ACM, 2015:131-140.
Valente J, Rdenas A A. Using Visual Challenges to Verify the Integrity of
Security Cameras[C]// Computer Security Applications Conference. ACM,
2015:141-150.
Barreto C, Rdenas A A, Quijano N, et al. CPS: market analysis of attacks
against demand response in the smart grid[C]// Computer Security
Applications Conference. ACM, 2014:136-145.

Rubin A D. Taking two-factor to the next level:protecting online poker,


banking, healthcare and other applications[C]// Proceedings of the 30th
Annual Computer Security Applications Conference. ACM, 2014:1-5.

Barthe G, Danezis G, Gregoire B, et al. Verified Computational


Differential Privacy with Applications to Smart Metering[C]// Computer
Security Foundations Symposium. IEEE, 2013:287-301.

Rahman M A, Jakaria A H M, Alshaer E. Formal Analysis for Dependable


Supervisory Control and Data Acquisition in Smart Grids[C]// Ieee/ifip
International Conference on Dependable Systems and Networks. IEEE
Computer Society, 2016:263-274.

Krishna V B, Lee K, Weaver G A, et al. F-DETA: A Framework for


Detecting Electricity Theft Attacks in Smart Grids[C]// Ieee/ifip
International Conference on Dependable Systems and Networks. IEEE
Computer Society, 2016:407-418.

Bachy Y, Basse F, Nicomette V, et al. Smart-TV Security Analysis:


Practical Experiments[C]// Ieee/ifip International Conference on
Dependable Systems and Networks. IEEE, 2015:497-504.

Radu A I, Garcia F D. LeiA: a lightweight authentication protocol for


CAN[C]//European Symposium on Research in Computer Security.
Springer International Publishing, 2016: 283-300.

Wu D J, Taly A, Shankar A, et al. Privacy, Discovery, and Authentication


for the Internet of Things[M]// Computer Security – ESORICS 2016.
Springer International Publishing, 2016.

Nguyen K T, Oualha N, Laurent M. Authenticated Key Agreement


Mediated by a Proxy Re-encryptor for the Internet of Things[M]//
Computer Security – ESORICS 2016. Springer International Publishing,
2016.
Zhang Y, Xiang Y, Huang X, et al. A Cross-Layer Key Establishment
Scheme in Wireless Mesh Networks[C]// European Symposium on
Research in Computer Security. Springer International Publishing,
2014:526-541.
Koo J, Lin X, Bagchi S. PRIVATUS: Wallet-Friendly Privacy Protection for
Smart Meters[M]// Computer Security – ESORICS 2012. Springer Berlin
Heidelberg, 2012:343-360.
Backes M, Meiser S. Differentially Private Smart Metering with Battery
Recharging[M]// Data Privacy Management and Autonomous
Spontaneous Security. Springer Berlin Heidelberg, 2014:194-212.

Altmeier C, Mainka C, Somorovsky J, et al. AdIDoS – Adaptive and


Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in
Web Services[C]// International Workshop on Data Privacy Management.
Springer, Cham, 2015:65-80.
Bayou L, Espes D, Cuppens-Boulahia N, et al. WirelessHART NetSIM: A
WirelessHART SCADA-Based Wireless Sensor Networks Simulator[M]//
Security of Industrial Control Systems and Cyber Physical Systems.
Springer International Publishing, 2015.

Mühlberg J T, Noorman J, Piessens F. Lightweight and Flexible Trust


Assessment Modules for the Internet of Things[M]// Computer Security --
ESORICS 2015. Springer International Publishing, 2015.

Pirker M, Slamanig D, Winter J. Practical Privacy Preserving Cloud


Resource-Payment for Constrained Clients[M]// Privacy Enhancing
Technologies. Springer Berlin Heidelberg, 2012:201-220.

Mashima D, Cárdenas A A. Evaluating electricity theft detectors in smart


grid networks[M]// Research in Attacks, Intrusions, and Defenses.
Springer Berlin Heidelberg, 2012:210-229.

Xu W, Lan G, Lin Q, et al. KEH-Gait: Towards a Mobile Healthcare User


Authentication System by Kinetic Energy Harvesting[J]. 2017.

Jia Y J, Chen Q A, Wang S, et al. ContexIoT: Towards Providing Contextual


Integrity to Appified IoT Platforms[J]. 2017.

Azab A M, Swidowski K, Bhutkar J M, et al. Skee: A lightweight secure


kernel-level execution environment for arm[C]//Network & Distributed
System Security Symposium (NDSS). 2016.

Eldefrawy K, Tsudik G, Francillon A, et al. SMART: Secure and Minimal


Architecture for (Establishing Dynamic) Root of Trust[C]//NDSS. 2012,
12: 1-15.
Fernandes E, Paupore J, Rahmati A, et al. Flowfence: Practical data
protection for emerging iot application frameworks[C]//USENIX Security
Symposium. 2016.

Costin A, Zaddach J, Francillon A, et al. A Large-Scale Analysis of the


Security of Embedded Firmwares[C]//USENIX Security. 2014: 95-110.

Chang S Y, Hu Y C, Anderson H, et al. Body area network security: robust


key establishment using human body channel[C]// Usenix Conference on
Health Security and Privacy. USENIX Association, 2012:5-5.

Mare S, Sorber J, Shin M, et al. Adaptive security and privacy for


mHealth sensing[C]// Usenix Workshop on Health Security. 2011.

Fernandes E, Jung J, Prakash A. Security Analysis of Emerging Smart


Home Applications[C]// Security & Privacy. IEEE Computer Society,
2016:636-654.

Copos B, Levitt K, Bishop M, et al. Is Anybody Home? Inferring Activity


From Smart Home Network Traffic[C]// Security and Privacy Workshops.
IEEE, 2016:245-251.

De S J, Metayer D L. Privacy Harm Analysis: A Case Study on Smart


Grids[C]// Security and Privacy Workshops. IEEE, 2016:58-65.

Majzoobi M, Rostami M, Koushanfar F, et al. Slender PUF Protocol: A


Lightweight, Robust, and Secure Authentication by Substring
Matching[C]// IEEE Symposium on Security and Privacy Workshops. IEEE
Computer Society, 2012:33-44.

Riliskis L, Shafagh H, Levis P. POSTER: Computations on Encrypted Data


in the Internet of Things Applications[C]// ACM Sigsac Conference on
Computer and Communications Security. ACM, 2015:1668-1670.

Ali M Q, Al-Shaer E. Configuration-based IDS for advanced metering


infrastructure[C]// ACM Sigsac Conference on Computer &
Communications Security. ACM, 2013:451-462.
Kasinathan P, Costamagna G, Khaleel H, et al. DEMO: An IDS framework
for internet of things empowered by 6LoWPAN[C]// ACM Sigsac
Conference on Computer & Communications Security. ACM, 2013:1337-
1340.

Yang W, Li N, Qi Y, et al. Minimizing private data disclosures in the smart


grid[C]// ACM Conference on Computer and Communications Security.
ACM, 2012:415-427.
Buchmann J, Pfert F, Neysu T, et al. High-Performance and Lightweight
Lattice-Based Public-Key Encryption[C]// ACM International Workshop on
Iot Privacy, Trust, and Security. ACM, 2016:2-9.

Aman M N, Chua K C, Sikdar B. Position Paper: Physical Unclonable


Functions for IoT Security[C]// ACM International Workshop on Iot
Privacy, Trust, and Security. ACM, 2016:10-13.

Haider I, Berl M, Rinner B. Trusted Sensors for Participatory Sensing and


IoT Applications based on Physically Unclonable Functions[C]// ACM
International Workshop on Iot Privacy, Trust, and Security. ACM,
2016:14-21.

Obermaier J, Hutle M. Analyzing the Security and Privacy of Cloud-based


Video Surveillance Systems[C]// ACM International Workshop on Iot
Privacy, Trust, and Security. ACM, 2016:22-28.

Hardjono T, Smith N. Cloud-Based Commissioning of Constrained


Devices using Permissioned Blockchains[C]// ACM International
Workshop on Iot Privacy, Trust, and Security. ACM, 2016:29-36.

Rauter T, Kajtazovic N, Kreiner C. Privilege-Based Remote


Attestation:Towards Integrity Assurance for Lightweight Clients[C]// ACM
Workshop on IoT Privacy, Trust, and Security. ACM, 2015:3-9.

Wang L, Nojima R, Moriai S. A Secure Automobile Information Sharing


System[C]// ACM Workshop on Iot Privacy, Trust, and Security. ACM,
2015:19-26.

Hao F, Yi X, Chen L, et al. The fairy-ring dance: Password authenticated


key exchange in a group[C]//Proceedings of the 1st ACM Workshop on
IoT Privacy, Trust, and Security. ACM, 2015: 27-34.

Szalachowski P, Perrig A. Lightweight Protection of Group Content


Distribution[C]// ACM Workshop on Iot Privacy, Trust, and Security. ACM,
2015:35-42.

Alcaide A, Palomar E, Montero-Castillo J, et al. Anonymous


authentication for privacy-preserving IoT target-driven applications[J].
Computers & Security, 2013, 37(9):111-123.

Deursen N V, Buchanan W J, Duff A. Monitoring information security risks


within health care[J]. Computers & Security, 2013, 37(9):31-45.

Lopez J, Alcaraz C, Roman R. Smart control of operational threats in


control substations[M]. Elsevier Advanced Technology Publications,
2013.
Saied Y B, Olivereau A, Zeghlache D, et al. Trust management system
design for the Internet of Things: A context-aware and multi-service
approach[J]. Computers & Security, 2013, 39(39):351-365.

Lin X J, Sun L, Qu H. Insecurity of an anonymous authentication for


privacy-preserving IoT target-driven applications[J]. Computers &
Security, 2015, 48(9):142-149.

Neisse R, Fovino I N, Baldini G, et al. A Model-Based Security Toolkit for


the Internet of Things[C]// Ninth International Conference on Availability,
Reliability and Security. IEEE, 2014:60-76.

Wan Z, Zhu W T, Wang G. PRAC: Efficient privacy protection for vehicle-


to-grid communications in the smart grid[J]. Computers & Security,
2016, 62:246-256.

Migault D, Guggemos T, Killian S, et al. Diet-ESP: IP layer security for


IoT[J]. Journal of computer security, 2017, 25(2): 173-203.

Chim T W, Yiu S, Li V O, et al. PRGA: Privacy-Preserving Recording &


Gateway-Assisted Authentication of Power Usage Information for Smart
Grid[J]. Dependable & Secure Computing IEEE Transactions on, 2014,
12(1):85-97.
Lu Z, Wang W, Wang C. Camouflage Traffic: Minimizing Message Delay
for Smart Grid Applications under Jamming[J]. Dependable & Secure
Computing IEEE Transactions on, 2015, 12(1):31-44.
Chen I R, Bao F, Guo J. Trust-Based Service Management for Social
Internet of Things Systems[J]. IEEE Transactions on Dependable &
Secure Computing, 2016, 13(6):684-696.

Rahman M A, Manshaei M H, Alshaer E S, et al. Secure and Private Data


Aggregation for Energy Consumption Scheduling in Smart Grids[J]. IEEE
Transactions on Dependable & Secure Computing, 2017, 14(2):221-234.

Kumar P, An B, Gurtov A, et al. Anonymous Secure Framework in


Connected Smart Home Environments[J]. IEEE Transactions on
Information Forensics & Security, 2017, PP(99):1-1.

Zhang A, Wang L, Ye X, et al. Light-weight and Robust Security-Aware


D2D-assist Data Transmission Protocol for Mobile-Health Systems[J].
IEEE Transactions on Information Forensics & Security, 2016, PP(99):1-1.

Shen H, Zhang M, Shen J. Efficient Privacy-Preserving Cube-Data


Aggregation Scheme for Smart Grids[J]. IEEE Transactions on Information
Forensics & Security, 2017, 12(6):1369-1381.
Yan J, He H, Zhong X, et al. Q-Learning-Based Vulnerability Analysis of
Smart Grid Against Sequential Topology Attacks[J]. IEEE Transactions on
Information Forensics & Security, 2016, 12(1):200-210.

Saxena N, Choi B J, Lu R. Authentication and Authorization Scheme for


Various User Roles and Devices in Smart Grid[J]. IEEE Transactions on
Information Forensics & Security, 2016, 11(5):907-921.

Li B, Lu R, Wang W, et al. DDOA: A Dirichlet-Based Detection Scheme for


Opportunistic Attacks in Smart Grid Cyber-Physical System[J]. IEEE
Transactions on Information Forensics & Security, 2016, 11(11):2415-
2425.

Raghavendra R, Raja K B, Busch C. Exploring the Usefulness of Light


Field Cameras for Biometrics: An Empirical Study on Face and Iris
Recognition[J]. IEEE Transactions on Information Forensics & Security,
2016, 11(5):922-936.

Gomez-Vilardebo J, Gunduz D. Smart meter privacy for multiple users in


the presence of an alternative energy source[C]// Global Conference on
Signal and Information Processing. IEEE, 2014:2027-2031.

Wang H, Qin B, Wu Q, et al. TPP: Traceable Privacy-Preserving


Communication and Precise Reward for Vehicle-to-Grid Networks in
Smart Grids[J]. IEEE Transactions on Information Forensics & Security,
2015, 10(11):2340-2351.

Guan L, Xu J, Wang S, et al. From Physical to Cyber: Escalating Protection


for Personalized Auto Insurance[C]// ACM Conference on Embedded
Network Sensor Systems Cd-Rom. ACM, 2016:42-55.

Li R, Asaeda H, Li J. A Distributed Publisher-Driven Secure Data Sharing


Scheme for Information-Centric IoT[J]. IEEE Internet of Things Journal,
2016, PP(99):1-1.

Wu W B, Cheng M X, Gou B. A Hypothesis Testing Approach for Topology


Error Detection in Power Grids[J]. IEEE Internet of Things Journal, 2017,
3(6):979-985.

Alharbi K N, Lin X, Shao J. A Privacy-Preserving Data-Sharing Framework


for Smart Grid[J]. IEEE Internet of Things Journal, 2017, 4(2):555-562.

Park C S. A Secure and Efficient ECQV Implicit Certificate Issuance


Protocol for the Internet of Things Applications[J]. IEEE Sensors Journal,
2016, PP(99):1-1.
Shen L, Ma J, Liu X, et al. A Secure and Efficient ID-Based Aggregate
Signature Scheme for Wireless Sensor Networks[J]. IEEE Internet of
Things Journal, 2016, PP(99):1-1.

Guo L, Ota K, Dong M, et al. A Secure Mechanism for Big Data Collection
in Large Scale Internet of Vehicles[J]. IEEE Internet of Things Journal,
2017, PP(99):1-1.

Guan Z, Li J, Wu L, et al. Achieving Efficient and Secure Data Acquisition


for Cloud-supported Internet of Things in Smart Grid[J]. IEEE Internet of
Things Journal, 2017, PP(99):1-1.

Zhao M, Ho I, Chong P H J. An Energy-efficient Region-based RPL Routing


Protocol for Low-Power and Lossy Networks[J]. IEEE Internet of Things
Journal, 2016, PP(99):1-1.

Shi Y, Han J, Wang X, et al. An Obfuscatable Aggregatable Signcryption


Scheme for Unattended Devices in IoT Systems[J]. IEEE Internet of
Things Journal, 2017.

He D, Zeadally S, Kumar N, et al. Anonymous Authentication for Wireless


Body Area Networks With Provable Security[J]. IEEE Systems Journal,
2016, PP(99):1-12.
Bao H, Lu R, Li B, et al. BLITHE: Behavior Rule-Based Insider Threat
Detection for Smart Grid[J]. IEEE Internet of Things Journal, 2016,
3(2):190-205.
Gope P, Hwang T. BSN-Care: A Secure IoT-Based Modern Healthcare
System Using Body Sensor Network[J]. IEEE Sensors Journal, 2016,
16(5):1368-1376.
Pang Y C, Lin G Y, Wei H Y. Context-Aware Dynamic Resource Allocation
for Cellular M2M Communications[J]. IEEE Internet of Things Journal,
2016, 3(3):318-326.

Althunibat S, Antonopoulos A, Kartsakli E, et al. Countering Intelligent-


Dependent Malicious Nodes in Target Detection Wireless Sensor
Networks[J]. IEEE Sensors Journal, 2016, 16(23):8627-8639.

La Q D, Quek T Q S, Lee J, et al. Deceptive Attack and Defense Game in


Honeypot-Enabled Networks for the Internet of Things[J]. IEEE Internet
of Things Journal, 2017, 3(6):1025-1035.
Sha M, Gunatilaka D, Wu C, et al. Empirical Study and Enhancements of
Industrial Wireless Sensor-Actuator Network Protocols[J]. IEEE Internet of
Things Journal, 2017, PP(99):1-1.
Li L, Lu R, Huang C. EPLQ: Efficient Privacy-Preserving Location-Based
Query Over Outsourced Encrypted Data[J]. IEEE Internet of Things
Journal, 2016, 3(2):206-218.

Ometov A, Bezzateev S, Kannisto J, et al. Facilitating the Delegation of


Use for Private Devices in the Era of the Internet of Wearable Things[J].
IEEE Internet of Things Journal, 2016, PP(99):1-1.

Gandino F, Ferrero R, Montrucchio B, et al. Fast Hierarchical Key


Management Scheme with Transitory Master Key for Wireless Sensor
Networks[J]. IEEE Internet of Things Journal, 2016, PP(99):1-1.

Zheng X, Cai Z, Yu J, et al. Follow But No Track: Privacy Preserved Profile


Publishing in Cyber-Physical Social Systems[J]. IEEE Internet of Things
Journal, 2017, PP(99):1-1.

Cao X, Shila D M, Cheng Y, et al. Ghost-in-ZigBee: Energy Depletion


Attack on ZigBee-Based Wireless Networks[J]. IEEE Internet of Things
Journal, 2016, 3(5):816-829.
Derhamy H, Eliasson J, Delsing J. IoT Interoperability - On-demand and
low latency Transparent Multi-protocol Translator[J]. IEEE Internet of
Things Journal, 2016, PP(99):1-1.
Aman M, Chua K C, Sikdar B. Mutual Authentication in IoT Systems using
Physical Unclonable Functions[J]. IEEE Internet of Things Journal, 2017,
PP(99):1-1.
Wunderlich S, Cabrera J, Fitzek F, et al. Network Coding in
Heterogeneous Multicore IoT Nodes with DAG Scheduling of Parallel
Matrix Block Operations[J]. IEEE Internet of Things Journal, 2017,
PP(99):1-1.

Vergara-Laurens I J, Jaimes L G, Labrador M A. Privacy-Preserving


Mechanisms for Crowdsensing: Survey and Research Challenges[J]. IEEE
Internet of Things Journal, 2016, PP(99):1-1.

Mahmoud M, Saputro N, Akula P, et al. Privacy-Preserving Power


Injection over a Hybrid AMI/LTE Smart Grid Network[J]. IEEE Internet of
Things Journal, 2016, PP(99):1-1.

Sherif A, Rabieh K, Mahmoud M, et al. Privacy-Preserving Ride Sharing


Scheme for Autonomous Vehicles in Big Data Era[J]. IEEE Internet of
Things Journal, 2016, PP(99):1-1.
Zhuo G, Jia Q, Guo L, et al. Privacy-preserving Verifiable Set Operation in
Big Data for Cloud-assisted Mobile Crowdsourcing[J]. IEEE Internet of
Things Journal, 2016, PP(99):1-1.

Chuang C H, Lee D H, Chang W J, et al. Real-time monitoring via patch-


type piezoelectric force sensors for Internet of Things based logistics[J].
IEEE Sensors Journal, 2017, PP(99):1-1.

Madueño G C, Čedomir Stefanović, Popovski P. Reliable and Efficient


Access for Alarm-Initiated and Regular M2M Traffic in IEEE 802.11ah
Systems[J]. IEEE Internet of Things Journal, 2017, 3(5):673-682.

Dong M, Ota K, Liu A. RMER: Reliable and Energy-Efficient Data


Collection for Large-Scale Wireless Sensor Networks[J]. IEEE Internet of
Things Journal, 2016, 3(4):511-519.
Chen D, Zhang N, Qin Z, et al. S2M: A Lightweight Acoustic Fingerprints
based Wireless Device Authentication Protocol[J]. IEEE Internet of Things
Journal, 2017, PP(99):1-1.
Gao Y, Qin Z, Feng Z, et al. Scalable & Reliable IoT Enabled By Dynamic
Spectrum Management for M2M in LTE-A[J]. IEEE Internet of Things
Journal, 2016, PP(99):1-1.

Celdrán A H, Clemente F J G, Pérez M G, et al. SeCoMan: A Semantic-


Aware Policy Framework for Developing Privacy-Preserving and Context-
Aware Smart Applications[J]. IEEE Systems Journal, 2016, 10(3):1111-
1124.

Tonyali S, Cakmak O, Akkaya K, et al. Secure Data Obfuscation Scheme


to Enable Privacy-Preserving State Estimation in Smart Grid AMI
Networks[J]. IEEE Internet of Things Journal, 2016, 3(5):709-719.

Shen W, Yin B, Liu L, et al. Secure In-Band Bootstrapping for Wireless


Personal Area Networks[J]. IEEE Internet of Things Journal, 2017,
3(6):1385-1394.
Ray B R, Chowdhury M U, Abawajy J H. Secure Object Tracking Protocol
for the Internet of Things[J]. IEEE Internet of Things Journal, 2016,
3(4):544-553.

Ko H, Jin J, Keoh S L. Secure Service Virtualization in IoT by Dynamic


Service Dependency Verification[J]. IEEE Internet of Things Journal,
2016, PP(99):1-1.

Ahmed K J, Lee M J. Secure, LTE-based V2X Service[J]. IEEE Internet of


Things Journal, 2017, PP(99):1-1.

Giuliano R, Mazzenga F, Neri A, et al. Security Access Protocols in IoT


Capillary Networks[J]. IEEE Internet of Things Journal, 2016, PP(99):1-1.
Gisdakis S, Giannetsos T, Papadimitratos P. Security, Privacy, and
Incentive Provision for Mobile Crowd Sensing Systems[J]. IEEE Internet of
Things Journal, 2016, 3(5):839-853.

Xu Q, Ren P, Song H, et al. Security-Aware Waveforms for Enhancing


Wireless Communications Privacy in Cyber-Physical Systems via
Multipath Receptions[J]. IEEE Internet of Things Journal, 2017, PP(99):1-
1.

Al-Nidawi Y, Yahya H, Kemp A H. Tackling Mobility in Low Latency


Deterministic Multihop IEEE 802.15.4e Sensor Network[J]. IEEE Sensors
Journal, 2016, 16(5):1412-1427.

Yang X, Zhang X, Lin J, et al. A Gaussian-Mixture Model Based Detection


Scheme against Data Integrity Attacks in the Smart Grid[C]//
International Conference on Computer Communication and Networks.
IEEE, 2016:1-9.

Singh J, Pasquier T, Bacon J, et al. Twenty Security Considerations for


Cloud-Supported Internet of Things[J]. IEEE Internet of Things Journal,
2016, 3(3):269-284.

Chow S S M. Functional Credentials for Internet of Things[C]// ACM


International Workshop on Iot Privacy, Trust, and Security. ACM, 2016:1-
1.

Li J, Seok M. Ultra-Compact and Robust Physically Unclonable Function


Based on Voltage-Compensated Proportional-to-Absolute-Temperature
Voltage Generators[J]. IEEE Journal of Solid-State Circuits, 2016,
51(9):2192-2202.

Hwang Y H. IoT Security & Privacy: Threats and Challenges[C]// ACM


Workshop on Iot Privacy, Trust, and Security. ACM, 2015:1-1.

Vasilomanolakis E, Daubert J, Luthra M, et al. On the Security and


Privacy of Internet of Things Architectures and Systems[C]//
International Workshop on Secure Internet of Things. IEEE, 2015:49-57.

Condra G. A Plea for Incremental Work in IoT Security[C]// International


Workshop on Trustworthy Embedded Devices. ACM, 2015:39-39.

Weimerskirch A. An Overview of Automotive Cybersecurity: Challenges


and Solution Approaches[C]// International Workshop on Trustworthy
Embedded Devices. ACM, 2015:53-53.

Medwed M. IoT Security Challenges and Ways Forward[C]// International


Workshop on Trustworthy Embedded Devices. ACM, 2016:55-55.
Yang Y, Wu L, Yin G, et al. A Survey on Security and Privacy Issues in
Internet-of-Things[J]. IEEE Internet of Things Journal, 2017, PP(99):1-1.

Contreras J, Zeadally S, Guerrero-Ibanez J A. Internet of Vehicles:


Architecture, Protocols, and Security[J]. IEEE Internet of Things Journal,
2017, PP(99):1-1.
Lin J, Yu W, Zhang N, et al. A Survey on Internet of Things: Architecture,
Enabling Technologies, Security and Privacy, and Applications[J]. IEEE
Internet of Things Journal, 2017, PP(99):1-1.
Ngu A H H, Gutierrez M, Metsis V, et al. IoT Middleware: A Survey on
Issues and Enabling technologies[J]. IEEE Internet of Things Journal,
2017, PP(99):1-1.

Yang Y, Peng H, Li L, et al. General Theory of Security and a Study Case


in Internet of Things[J]. IEEE Internet of Things Journal, 2016, PP(99):1-1.
Li S, Tryfonas T, Li H. The Internet of Things: a security point of view[J].
Internet Research, 2016, 26(2):337-359.
Sicari S, Rizzardi A, Grieco L A, et al. Security, privacy and trust in
Internet of Things: The road ahead[J]. Computer Networks, 2015,
76:146-164.
Popescul D, Georgescu M. Security, Privacy and Trust in Internet of
Things: A Straight Road?[C]// Ibima Conference. 2015.

Roman R, Zhou J, Lopez J. On the features and challenges of security


and privacy in distributed internet of things[J]. Computer Networks,
2013, 57(10):2266-2279.
Zhao K, Ge L. A Survey on the Internet of Things Security[C]// Ninth
International Conference on Computational Intelligence and Security.
IEEE Computer Society, 2013:663-667.
Mahmood Z. Connectivity Frameworks for Smart Devices[J]. Computer
Communications & Networks, 2016.
年份 名称
A Distributed Publisher-Driven Secure Data Sharing Scheme for
2017
Information-Centric IoT

A Hypothesis Testing Approach for Topology Error Detection in Power


2016
Grids

2017 A Privacy-Preserving Data-Sharing Framework for Smart Grid

A Secure and Efficient ECQV Implicit Certificate Issuance Protocol for


2017
the Internet of Things Applications

A Secure and Efficient ID-Based Aggregate


2017
Signature Scheme for Wireless Sensor Networks

A Secure Mechanism for Big Data Collection


2017
in Large Scale Internet of Vehicle

Achieving Efficient and Secure Data Acquisition for Cloud-supported


2017
Internet of Things in Smart Grid

An Energy-Efficient Region-Based RPL Routing Protocol for Low-Power


2016
and Lossy Networks

An Obfuscatable Aggregatable Signcryption Scheme for Unattended


2017
Devices in IoT Systems

Anonymous Authentication for Wireless Body Area Networks With


2016
Provable Security

BLITHE: Behavior Rule-Based Insider Threat


2016
Detection for Smart Grid

BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body


2016
Sensor Network

Context-Aware Dynamic Resource Allocation


2016
for Cellular M2M Communications

Countering Intelligent-Dependent Malicious Nodes in Target Detection


2016
Wireless Sensor Networks

Deceptive Attack and Defense Game in


2016 Honeypot-Enabled Networks for
the Internet of Things
Empirical Study and Enhancements of Industrial Wireless Sensor-
2017
Actuator Network Protocols

EPLQ: Efficient Privacy-Preserving Location-Based Query Over


2016
Outsourced Encrypted Data

Facilitating the Delegation of Use for Private Devices in the Era of the
2016
Internet of Wearable Things

Fast Hierarchical Key Management Scheme With Transitory Master Key


2016
for Wireless Sensor Networks

Follow But No Track: Privacy Preserved Profile Publishing in Cyber-


2017
Physical Social Systems

Ghost-in-ZigBee: Energy Depletion Attack on


2016
ZigBee-Based Wireless Networks

IoT Interoperability - On-demand and low latency Transparent Multi-


2017
protocol Translator

Mutual Authentication in IoT Systems using Physical Unclonable


2017
Functions

Network Coding in Heterogeneous Multicore IoT Nodes with DAG


2017
Scheduling of Parallel Matrix Block Operations

Privacy-Preserving Mechanisms for Crowdsensing: Survey and


2016
Research Challenges

Privacy-Preserving Power Injection over a


2016
Hybrid AMI/LTE Smart Grid Network

Privacy-Preserving Ride Sharing Scheme for


2017
Autonomous Vehicles in Big Data Era

Privacy-Preserving Verifiable Set Operation in Big Data for Cloud-


2017
Assisted Mobile Crowdsourcing

Real-Time Monitoring via Patch-Type Piezoelectric Force Sensors for


2017
Internet of Things Based Logistics

Reliable and Efficient Access for Alarm-Initiated and Regular M2M


2016
Traffic in IEEE 802.11ah Systems

RMER: Reliable and Energy-Efficient Data


2016
Collection for Large-Scale Wireless Sensor Networks
S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device
2017
Authentication Protocol

Scalable and Reliable IoT Enabled by Dynamic Spectrum Management


2016
for M2M in LTE-A

SeCoMan: A Semantic-Aware Policy Framework for Developing Privacy-


2016
Preserving and Context-Aware Smart Applications

Secure Data Obfuscation Scheme to Enable Privacy-Preserving State


2016
Estimation in Smart Grid AMI Networks

2016 Secure In-Band Bootstrapping for Wireless Personal Area Networks

Secure Object Tracking Protocol for


2016
the Internet of Things

Secure Service Virtualization in IoT by Dynamic Service Dependency


2016
Verification

2017 Secure, LTE-based V2X Service

2016 Security Access Protocols in IoT Capillary Networks

Security, Privacy, and Incentive Provision for


2016
Mobile Crowd Sensing Systems

Security-Aware Waveforms for Enhancing Wireless Communications


2017
Privacy in Cyber-Physical Systems via Multipath Receptions

Tackling Mobility in Low Latency Deterministic


2016
Multihop IEEE 802.15.4e Sensor Network

Toward a Gaussian-Mixture Model-Based Detection Scheme Against


2017
Data Integrity Attacks in the Smart Grid

Twenty Security Considerations for


2016
Cloud-Supported Internet of Things

Ultra-Compact and Robust Physically Unclonable Function Based on


2016 Voltage-Compensated Proportional-to-Absolute-Temperature Voltage
Generators
类型 应用场景 层次
不安全的云
其他 应用层
服务

其他 智能电网 应用层

隐私泄露 智能电网 应用层

不安全的应
智能家居 网络层

不安全的网 网络层(传
WSN
络 感器网络)

隐私泄露 智能汽车 应用层

不安全的云
智能电网 应用层
服务

智能医疗,
不安全的网
工业控制, 网络层

自动化建筑

智能工控/
其他 感知层
智能医疗

不安全的网
智能医疗 网络层

不安全的网
智能电网 控制层

不安全的网
智能医疗 网络层

不安全的网
其他 网络层

不安全的网 网络层(传
WSN
络 感器网络)

不安全的网
其他 网络层

不安全的网
智能工控 网络层

隐私泄露 其他 应用层

其他 智能家居 应用层

不安全的网 网络层(传
WSN
络 感器网络)

隐私泄露 其他 应用层

不安全的网
WSN 网络层

不安全的协
智能工控 网络层

其他 其他 网络层

其他 智能工控 控制层

隐私泄露 其他 应用层

不安全的网
智能电网 网络层

隐私泄露 智能汽车 应用层

不安全的云
其他 应用层
服务

不安全的配
智能工控 感知层

不安全的网 网络层
其他
络 (M2M)

不安全的网 网络层(传
WSN
络 感器网络)
不安全的网
其他 感知层

不安全的网 网络层
其他
络 (M2M)

不安全的应
智能家居 应用层

隐私泄露 智能电网 应用层

不安全的网 网络层(无
其他
络 线个域网)

其他 物流 网络层

不安全的云
其他 应用层
服务
不安全的网 网络层
智能汽车
络 (V2X)
不安全的网
智慧城市 网络层

不安全的配
智慧城市 应用层

隐私泄露 智能工控 网络层

不安全的网
智能汽车 应用层

不安全的网
智能电网 控制层

不安全的云
其他 应用层
服务

其他 底层 应用层
引用
Li R, Asaeda H, Li J. A Distributed Publisher-Driven Secure Data Sharing
Scheme for Information-Centric IoT[J]. IEEE Internet of Things Journal, 2016,
PP(99):1-1.
Wu W B, Cheng M X, Gou B. A Hypothesis Testing Approach for Topology
Error Detection in Power Grids[J]. IEEE Internet of Things Journal, 2017,
3(6):979-985.

Alharbi K N, Lin X, Shao J. A Privacy-Preserving Data-Sharing Framework for


Smart Grid[J]. IEEE Internet of Things Journal, 2017, 4(2):555-562.

Park C S. A Secure and Efficient ECQV Implicit Certificate Issuance Protocol


for the Internet of Things Applications[J]. IEEE Sensors Journal, 2016,
PP(99):1-1.
Shen L, Ma J, Liu X, et al. A Secure and Efficient ID-Based Aggregate
Signature Scheme for Wireless Sensor Networks[J]. IEEE Internet of Things
Journal, 2016, PP(99):1-1.
Guo L, Ota K, Dong M, et al. A Secure Mechanism for Big Data Collection in
Large Scale Internet of Vehicles[J]. IEEE Internet of Things Journal, 2017,
PP(99):1-1.
Guan Z, Li J, Wu L, et al. Achieving Efficient and Secure Data Acquisition for
Cloud-supported Internet of Things in Smart Grid[J]. IEEE Internet of Things
Journal, 2017, PP(99):1-1.

Zhao M, Ho I, Chong P H J. An Energy-efficient Region-based RPL Routing


Protocol for Low-Power and Lossy Networks[J]. IEEE Internet of Things
Journal, 2016, PP(99):1-1.

Shi Y, Han J, Wang X, et al. An Obfuscatable Aggregatable Signcryption


Scheme for Unattended Devices in IoT Systems[J]. IEEE Internet of Things
Journal, 2017.
He D, Zeadally S, Kumar N, et al. Anonymous Authentication for Wireless
Body Area Networks With Provable Security[J]. IEEE Systems Journal, 2016,
PP(99):1-12.
Bao H, Lu R, Li B, et al. BLITHE: Behavior Rule-Based Insider Threat
Detection for Smart Grid[J]. IEEE Internet of Things Journal, 2016, 3(2):190-
205.
Gope P, Hwang T. BSN-Care: A Secure IoT-Based Modern Healthcare System
Using Body Sensor Network[J]. IEEE Sensors Journal, 2016, 16(5):1368-
1376.
Pang Y C, Lin G Y, Wei H Y. Context-Aware Dynamic Resource Allocation for
Cellular M2M Communications[J]. IEEE Internet of Things Journal, 2016,
3(3):318-326.
Althunibat S, Antonopoulos A, Kartsakli E, et al. Countering Intelligent-
Dependent Malicious Nodes in Target Detection Wireless Sensor
Networks[J]. IEEE Sensors Journal, 2016, 16(23):8627-8639.
La Q D, Quek T Q S, Lee J, et al. Deceptive Attack and Defense Game in
Honeypot-Enabled Networks for the Internet of Things[J]. IEEE Internet of
Things Journal, 2017, 3(6):1025-1035.
Sha M, Gunatilaka D, Wu C, et al. Empirical Study and Enhancements of
Industrial Wireless Sensor-Actuator Network Protocols[J]. IEEE Internet of
Things Journal, 2017, PP(99):1-1.
Li L, Lu R, Huang C. EPLQ: Efficient Privacy-Preserving Location-Based
Query Over Outsourced Encrypted Data[J]. IEEE Internet of Things Journal,
2016, 3(2):206-218.
Ometov A, Bezzateev S, Kannisto J, et al. Facilitating the Delegation of Use
for Private Devices in the Era of the Internet of Wearable Things[J]. IEEE
Internet of Things Journal, 2016, PP(99):1-1.
Gandino F, Ferrero R, Montrucchio B, et al. Fast Hierarchical Key
Management Scheme with Transitory Master Key for Wireless Sensor
Networks[J]. IEEE Internet of Things Journal, 2016, PP(99):1-1.
Zheng X, Cai Z, Yu J, et al. Follow But No Track: Privacy Preserved Profile
Publishing in Cyber-Physical Social Systems[J]. IEEE Internet of Things
Journal, 2017, PP(99):1-1.
Cao X, Shila D M, Cheng Y, et al. Ghost-in-ZigBee: Energy Depletion Attack
on ZigBee-Based Wireless Networks[J]. IEEE Internet of Things Journal,
2016, 3(5):816-829.
Derhamy H, Eliasson J, Delsing J. IoT Interoperability - On-demand and low
latency Transparent Multi-protocol Translator[J]. IEEE Internet of Things
Journal, 2016, PP(99):1-1.
Aman M, Chua K C, Sikdar B. Mutual Authentication in IoT Systems using
Physical Unclonable Functions[J]. IEEE Internet of Things Journal, 2017,
PP(99):1-1.

Wunderlich S, Cabrera J, Fitzek F, et al. Network Coding in Heterogeneous


Multicore IoT Nodes with DAG Scheduling of Parallel Matrix Block
Operations[J]. IEEE Internet of Things Journal, 2017, PP(99):1-1.

Vergara-Laurens I J, Jaimes L G, Labrador M A. Privacy-Preserving


Mechanisms for Crowdsensing: Survey and Research Challenges[J]. IEEE
Internet of Things Journal, 2016, PP(99):1-1.
Mahmoud M, Saputro N, Akula P, et al. Privacy-Preserving Power Injection
over a Hybrid AMI/LTE Smart Grid Network[J]. IEEE Internet of Things
Journal, 2016, PP(99):1-1.
Sherif A, Rabieh K, Mahmoud M, et al. Privacy-Preserving Ride Sharing
Scheme for Autonomous Vehicles in Big Data Era[J]. IEEE Internet of Things
Journal, 2016, PP(99):1-1.
Zhuo G, Jia Q, Guo L, et al. Privacy-preserving Verifiable Set Operation in
Big Data for Cloud-assisted Mobile Crowdsourcing[J]. IEEE Internet of Things
Journal, 2016, PP(99):1-1.
Chuang C H, Lee D H, Chang W J, et al. Real-time monitoring via patch-type
piezoelectric force sensors for Internet of Things based logistics[J]. IEEE
Sensors Journal, 2017, PP(99):1-1.
Madueño G C, Čedomir Stefanović, Popovski P. Reliable and Efficient Access
for Alarm-Initiated and Regular M2M Traffic in IEEE 802.11ah Systems[J].
IEEE Internet of Things Journal, 2017, 3(5):673-682.
Dong M, Ota K, Liu A. RMER: Reliable and Energy-Efficient Data Collection
for Large-Scale Wireless Sensor Networks[J]. IEEE Internet of Things Journal,
2016, 3(4):511-519.
Chen D, Zhang N, Qin Z, et al. S2M: A Lightweight Acoustic Fingerprints
based Wireless Device Authentication Protocol[J]. IEEE Internet of Things
Journal, 2017, PP(99):1-1.
Gao Y, Qin Z, Feng Z, et al. Scalable & Reliable IoT Enabled By Dynamic
Spectrum Management for M2M in LTE-A[J]. IEEE Internet of Things Journal,
2016, PP(99):1-1.

Celdrán A H, Clemente F J G, Pérez M G, et al. SeCoMan: A Semantic-Aware


Policy Framework for Developing Privacy-Preserving and Context-Aware
Smart Applications[J]. IEEE Systems Journal, 2016, 10(3):1111-1124.

Tonyali S, Cakmak O, Akkaya K, et al. Secure Data Obfuscation Scheme to


Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks[J].
IEEE Internet of Things Journal, 2016, 3(5):709-719.
Shen W, Yin B, Liu L, et al. Secure In-Band Bootstrapping for Wireless
Personal Area Networks[J]. IEEE Internet of Things Journal, 2017, 3(6):1385-
1394.
Ray B R, Chowdhury M U, Abawajy J H. Secure Object Tracking Protocol for
the Internet of Things[J]. IEEE Internet of Things Journal, 2016, 3(4):544-
553.
Ko H, Jin J, Keoh S L. Secure Service Virtualization in IoT by Dynamic Service
Dependency Verification[J]. IEEE Internet of Things Journal, 2016, PP(99):1-
1.
Ahmed K J, Lee M J. Secure, LTE-based V2X Service[J]. IEEE Internet of
Things Journal, 2017, PP(99):1-1.
Giuliano R, Mazzenga F, Neri A, et al. Security Access Protocols in IoT
Capillary Networks[J]. IEEE Internet of Things Journal, 2016, PP(99):1-1.

Gisdakis S, Giannetsos T, Papadimitratos P. Security, Privacy, and Incentive


Provision for Mobile Crowd Sensing Systems[J]. IEEE Internet of Things
Journal, 2016, 3(5):839-853.

Xu Q, Ren P, Song H, et al. Security-Aware Waveforms for Enhancing


Wireless Communications Privacy in Cyber-Physical Systems via Multipath
Receptions[J]. IEEE Internet of Things Journal, 2017, PP(99):1-1.

Al-Nidawi Y, Yahya H, Kemp A H. Tackling Mobility in Low Latency


Deterministic Multihop IEEE 802.15.4e Sensor Network[J]. IEEE Sensors
Journal, 2016, 16(5):1412-1427.

Yang X, Zhang X, Lin J, et al. A Gaussian-Mixture Model Based Detection


Scheme against Data Integrity Attacks in the Smart Grid[C]// International
Conference on Computer Communication and Networks. IEEE, 2016:1-9.

Singh J, Pasquier T, Bacon J, et al. Twenty Security Considerations for Cloud-


Supported Internet of Things[J]. IEEE Internet of Things Journal, 2016,
3(3):269-284.
Li J, Seok M. Ultra-Compact and Robust Physically Unclonable Function
Based on Voltage-Compensated Proportional-to-Absolute-Temperature
Voltage Generators[J]. IEEE Journal of Solid-State Circuits, 2016,
51(9):2192-2202.

Das könnte Ihnen auch gefallen