Beruflich Dokumente
Kultur Dokumente
Year Title
2013 Securing ZigBee Smart Energy Profile 1.x with OpenECC Library
2014 Federated Identity and Access Management for the Internet of Things
2013 IARCrypto
2016 Is Anybody Home? Inferring Activity From Smart Home Network Traffic
Facilitating the Delegation of Use for Private Devices in the Era of the
2016
Internet of Wearable Things
Reliable and Efficient Access for Alarm-Initiated and Regular M2M Traffic
2016
in IEEE 802.11ah Systems
Sur
2015 IoT Security & Privacy: Threats and Challenges
2015 Security, privacy and trust in Internet of Things: The road ahead
Application
Digital logic, Data to
Privacy Leaks
Healthcare decision often
in the cloud
Application
Digital logic, Data to
Privacy Leaks
Healthcare decision often
in the cloud
Vulnerable
Digital
Embedded Sensing
Healthcare
System/Firmware
Application
Insufficient Security Digital logic, Data to
Configurability Healthcare decision often
in the cloud
Actuation,
Insufficient Security Digital
Command and
Access Control Healthcare
Control
Insecure Network
Communication/Proto Smart Grid Transfer
col
Insecure Network
Communication/Proto Smart Grid Transfer
col
Insecure Network
Communication/Proto Smart Grid Transfer
col
Insecure Network Actuation,
Communication/Proto Smart Grid Command and
col Control
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Application
Insecure Network
logic, Data to
Communication/Proto Smart Grid
decision often
col
in the cloud
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Vulnerable
Smart
Embedded /
Manufacturing
System/Firmware
Application
logic, Data to
Others Smart Grid
decision often
in the cloud
Actuation,
Others Smart Grid Command and
Control
Insecure Network
Communication/Proto Smart Grid /
col
Vulnerable
Embedded Others Sensing
System/Firmware
Insecure Network
Communication/Proto Others Transfer
col
Actuation,
Vulnerable
Others Command and
Cloud/Web Service
Control
Vulnerable
Smart
Embedded /
Manufacturing
System/Firmware
Insecure Network
Communication/Proto Bluetooth Transfer
col
Insufficient Security
Others Transfer
Authentication
Insecure Network
Communication/Proto Others Transfer
col
Digital Actuation,
Insecure Mobile
Healthcare/Smar Command and
Application
t Manufacturing Control
Actuation,
Insufficient Security
Others Command and
Authentication
Control
Application
Vulnerable
logic, Data to
Embedded Others
decision often
System/Firmware
in the cloud
Insecure Network
Communication/Proto Others Transfer
col
Insecure Network
Digital
Communication/Proto Transfer
Healthcare
col
Insecure Mobile
Smart Home Transfer
Application
Insecure Network Actuation,
Wireless Sensor
Communication/Proto Command and
Networks
col Control
Application
Insecure Mobile logic, Data to
Smart Home
Application decision often
in the cloud
Application
Vulnerable logic, Data to
Database
Cloud/Web Service decision often
in the cloud
Application
logic, Data to
Privacy Leaks Smart Home
decision often
in the cloud
Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col
Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col
Application
Vulnerable
logic, Data to
Embedded Others
decision often
System/Firmware
in the cloud
Vulnerable Application
Cloud/Web logic, Data to
Others
Service/Privacy decision often
Leaks in the cloud
Insecure Network
Communication/Proto Others Transfer
col
Application
Smart
Insecure Mobile logic, Data to
Home/Digital
Application decision often
Healthcare
in the cloud
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Application
logic, Data to
Others Smart Home
decision often
in the cloud
Actuation,
Insufficient Security
Smart Vehicles Command and
Authentication
Control
Application
logic, Data to
Privacy Leaks Others
decision often
in the cloud
Insecure Network
Communication/Proto Others Transfer
col
Insecure Network
Communication/Proto Others Transfer
col
Insecure Network
Smart
Communication/Proto Transfer
Manufacturing
col
Actuation,
Others Others Command and
Control
Vulnerable Application
Cloud/Web logic, Data to
Smart Home
Service/Privacy decision often
Leaks in the cloud
Application
Insecure Network
logic, Data to
Communication/Proto Smart Grid
decision often
col
in the cloud
Application
Insufficient Security Digital logic, Data to
Authentication Healthcare decision often
in the cloud
Application
Insecure Mobile logic, Data to
Smart Home
Application decision often
in the cloud
Vulnerable
Embedded Others Sensing
System/Firmware
Digital
Privacy Leaks Transfer
Healthcare
Application
Insecure Mobile logic, Data to
Smart Home
Application decision often
in the cloud
Insecure Network
Communication/Proto Smart Home Transfer
col
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Application
Insecure Physical logic, Data to
Others
Environment decision often
in the cloud
Smart
Privacy Leaks Home/Digital Transfer
Healthcare
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Vulnerable
Embedded Others Transfer
System/Firmware
Application
Insecure Mobile logic, Data to
Others
Application decision often
in the cloud
Application
Vulnerable logic, Data to
Smart Home
Cloud/Web Service decision often
in the cloud
Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud
Actuation,
Insecure Mobile
Others Command and
Application
Control
Vulnerable
Smart Vehicles Transfer
Cloud/Web Service
Insecure Network
Communication/Proto Others Transfer
col
Insecure Network
Communication/Proto Others Transfer
col
Application
Insecure Mobile
logic, Data to
Application/Privacy Smart Home
decision often
Leaks
in the cloud
Application
Digital logic, Data to
Others
Healthcare decision often
in the cloud
Actuation,
Insufficient Security
Smart Grid Command and
Configurability
Control
Actuation,
Vulnerable
Others Command and
Cloud/Web Service
Control
Insecure Mobile
Smart Home Transfer
Application
Application
Smart
logic, Data to
Privacy Leaks Home/Digital
decision often
Healthcare
in the cloud
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Insecure Network
Communication/Proto Others Transfer
col
Insecure Network
Communication/Proto Smart Grid Transfer
col
Vulnerable Actuation,
Embedded Others Command and
System/Firmware Control
Application
Insufficient Security logic, Data to
Smart Home
Configurability decision often
in the cloud
Insecure Network
Digital
Communication/Proto Transfer
Healthcare
col
Actuation,
Insufficient Security
Smart Grid Command and
Authentication
Control
Application
Insecure Network
logic, Data to
Communication/Proto Smart Grid
decision often
col
in the cloud
Insecure Network
Communication/Proto Smart Vehicles Transfer
col
Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud
Application
logic, Data to
Others Smart Grid
decision often
in the cloud
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Insecure Mobile
Smart Home Transfer
Application
Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col
Application
logic, Data to
Privacy Leaks Smart Vehicles
decision often
in the cloud
Application
Vulnerable logic, Data to
Smart Grid
Cloud/Web Service decision often
in the cloud
Digital
Others Healthcare/Smar Sensing
t Manufacturing
Insecure Network
Digital
Communication/Proto Transfer
Healthcare
col
Insecure Network Actuation,
Communication/Proto Smart Grid Command and
col Control
Insecure Network
Digital
Communication/Proto Transfer
Healthcare
col
Insecure Network
Communication/Proto Others Transfer
col
Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col
Insecure Network
Communication/Proto Others Transfer
col
Insecure Network
Smart
Communication/Proto Transfer
Manufacturing
col
Application
logic, Data to
Privacy Leaks Others
decision often
in the cloud
Application
logic, Data to
Others Smart Home
decision often
in the cloud
Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col
Application
logic, Data to
Privacy Leaks Others
decision often
in the cloud
Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col
Insecure Network
Smart
Communication/Proto Transfer
Manufacturing
col
Actuation,
Smart
Others Command and
Manufacturing
Control
Application
logic, Data to
Privacy Leaks Others
decision often
in the cloud
Insecure Network
Communication/Proto Smart Grid Transfer
col
Application
logic, Data to
Privacy Leaks Smart Vehicles
decision often
in the cloud
Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud
Insecure Network
Communication/Proto Others Transfer
col
Insecure Network
Wireless Sensor
Communication/Proto Transfer
Networks
col
Insecure Network
Communication/Proto Others Sensing
col
Insecure Network
Communication/Proto Others Transfer
col
Application
Insecure Mobile logic, Data to
Smart Home
Application decision often
in the cloud
Application
logic, Data to
Privacy Leaks Smart Grid
decision often
in the cloud
Insecure Network
Communication/Proto Others Transfer
col
Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud
Insecure Network
Communication/Proto Smart Vehicles Transfer
col
Insecure Network
Communication/Proto Smart City Transfer
col
Application
Insufficient Security logic, Data to
Smart City
Configurability decision often
in the cloud
Smart
Privacy Leaks Transfer
Manufacturing
Application
Insecure Network
logic, Data to
Communication/Proto Smart Vehicles
decision often
col
in the cloud
Application
Vulnerable logic, Data to
Others
Cloud/Web Service decision often
in the cloud
Others Others /
Application
logic, Data to
Others Others
decision often
in the cloud
Survey paper
/ / /
/ / /
/ / /
/ Smart Vehicles /
/ / /
/ / /
/ Smart Vehicles /
/ / /
/ / /
/ / /
/ / /
/ / /
/ / /
/ / /
/ / /
/ / /
/ / /
References
Guo L, Ota K, Dong M, et al. A Secure Mechanism for Big Data Collection
in Large Scale Internet of Vehicles[J]. IEEE Internet of Things Journal,
2017, PP(99):1-1.
Facilitating the Delegation of Use for Private Devices in the Era of the
2016
Internet of Wearable Things
其他 智能电网 应用层
不安全的应
智能家居 网络层
用
不安全的网 网络层(传
WSN
络 感器网络)
不安全的云
智能电网 应用层
服务
智能医疗,
不安全的网
工业控制, 网络层
络
自动化建筑
智能工控/
其他 感知层
智能医疗
不安全的网
智能医疗 网络层
络
不安全的网
智能电网 控制层
络
不安全的网
智能医疗 网络层
络
不安全的网
其他 网络层
络
不安全的网 网络层(传
WSN
络 感器网络)
不安全的网
其他 网络层
络
不安全的网
智能工控 网络层
络
隐私泄露 其他 应用层
其他 智能家居 应用层
不安全的网 网络层(传
WSN
络 感器网络)
隐私泄露 其他 应用层
不安全的网
WSN 网络层
络
不安全的协
智能工控 网络层
议
其他 其他 网络层
其他 智能工控 控制层
隐私泄露 其他 应用层
不安全的网
智能电网 网络层
络
不安全的云
其他 应用层
服务
不安全的配
智能工控 感知层
置
不安全的网 网络层
其他
络 (M2M)
不安全的网 网络层(传
WSN
络 感器网络)
不安全的网
其他 感知层
络
不安全的网 网络层
其他
络 (M2M)
不安全的应
智能家居 应用层
用
不安全的网 网络层(无
其他
络 线个域网)
其他 物流 网络层
不安全的云
其他 应用层
服务
不安全的网 网络层
智能汽车
络 (V2X)
不安全的网
智慧城市 网络层
络
不安全的配
智慧城市 应用层
置
不安全的网
智能汽车 应用层
络
不安全的网
智能电网 控制层
络
不安全的云
其他 应用层
服务
其他 底层 应用层
引用
Li R, Asaeda H, Li J. A Distributed Publisher-Driven Secure Data Sharing
Scheme for Information-Centric IoT[J]. IEEE Internet of Things Journal, 2016,
PP(99):1-1.
Wu W B, Cheng M X, Gou B. A Hypothesis Testing Approach for Topology
Error Detection in Power Grids[J]. IEEE Internet of Things Journal, 2017,
3(6):979-985.