1887

Abstract

Summary

No summary available.

Loading

Article metrics loading...

/content/papers/10.2523/IPTC-19072-MS
2019-03-26
2024-04-25
Loading full text...

Full text loading...

References

  1. 1.Khan, W.Z., et al.A reliable Internet of Things based architecture for oil and gas industry. in Advanced Communication Technology (ICACT), 201719th International Conference on. 2017. IEEE.
    [Google Scholar]
  2. 2.Chen, S., et al., A vision of IoT: Applications, challenges, and opportunities with china perspective.IEEE Internet of Things journal, 2014. 1(4): p. 349–359.
    [Google Scholar]
  3. 3.Mumtaz, S., et al., Massive Internet of Things for industrial applications: Addressing wireless IIoT connectivity challenges and ecosystem fragmentation.IEEE Industrial Electronics Magazine, 2017. 11(1): p. 28–33.
    [Google Scholar]
  4. 4.Finn, R.L. and D.Wright, Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications.Computer Law & Security Review, 2012. 28(2): p. 184–194.
    [Google Scholar]
  5. 5.Gosselin, C., et al., Large-scale 3D printing of ultra-high performance concrete–a new processing route for architects and builders.Materials & Design, 2016. 100: p. 102–109.
    [Google Scholar]
  6. 6.Lee, J., Smart factory systems.Informatik-Spektrum, 2015. 38(3): p. 230–235.
    [Google Scholar]
  7. 7.Hankel, M. and B.Rexroth, The reference architectural model industrie 4.0 (rami 4.0). ZVEI, April, 2015.
    [Google Scholar]
  8. 8.Flatt, H., et al.Analysis of the Cyber-Security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements.in Emerging Technologies and Factory Automation (ETFA), 2016 IEEE 21st International Conference on.2016. IEEE.
    [Google Scholar]
  9. 9.Vaidyaa, S., P.Ambadb, and S.Bhoslec, Industry 4.0–A Glimpse. Design Engineering, 2018. 2351: p. 9789.
    [Google Scholar]
  10. 10.Stout, W.M.S. and V.E.Urias. Challenges to securing the Internet of Things.in 2016 IEEE International Carnahan Conference on Security Technology (ICCST). 2016.
    [Google Scholar]
  11. 11.He, H., et al.The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. in Evolutionary Computation (CEC), 2016 IEEE Congress on.2016. IEEE.
    [Google Scholar]
  12. 12.Greenough, J.How the ‘Internet of Things’ will impact consumers, businesses, and governments in 2016 and beyond.2016; Available from: https://nordic.businessinsider.com/how-the-internet-of-things-market-will-grow-2014-10/.
    [Google Scholar]
  13. 13.Johnston, S.J., M.Scott, and S.J.Cox. Recommendations for securing Internet of Things devices using commodity hardware. in 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). 2016.
    [Google Scholar]
  14. 14.Sujatha, S.M. and Y.U.Devi. Design and implementation of IoT testbed with three factor authentication. in 2016 International Conference on Communication and Electronics Systems (ICCES). 2016.
    [Google Scholar]
  15. 15.Bohli, J.-M., P.Langendörfer, and A.F.Skarmeta, Security and privacy challenge in data aggregation for the iot in smart cities. Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems, 2013: p. 225–244.
    [Google Scholar]
  16. 16.Roman, R., P.Najera, and J.Lopez, Securing the Internet of Things. Computer, 2011. 44(9): p. 51–58.
    [Google Scholar]
  17. 17.Sajid, A., H.Abbas, and K.Saleem, Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 2016. 4: p. 1375–1384.
    [Google Scholar]
  18. 18.Babar, S., et al.Proposed security model and threat taxonomy for the Internet of Things (IoT). in International Conference on Network Security and Applications. 2010. Springer.
    [Google Scholar]
  19. 19.Griffin, P.H.Secure authentication on the Internet of Things. in SoutheastCon 2017. 2017.
    [Google Scholar]
  20. 20.Aman, M., K.C.Chua, and B.Sikdar, Mutual Authentication in IoT Systems using Physical Unclonable Functions.IEEE Internet of Things Journal, 2017. PP(99): p. 1–1.
    [Google Scholar]
  21. 21.Mahalle, P., et al.Identity management framework towards internet of things (IoT): Roadmap and key challenges.in International Conference on Network Security and Applications. 2010. Springer.
    [Google Scholar]
  22. 22.Cao, Y. and L.Yang. A survey of identity management technology.in Information Theory and Information Security (ICITIS), 2010 IEEE international conference on.2010. IEEE.
    [Google Scholar]
  23. 23.El Maliki, T. and J.-M.Seigneur. A survey of user-centric identity management technologies. in Emerging Security Information, Systems, and Technologies, 2007.SecureWare 2007. The International Conference on.2007. IEEE.
    [Google Scholar]
  24. 24.Crossman, M.A. and L.Hong. Study of authentication with IoT testbed. in 2015 IEEE International Symposium on Technologies for Homeland Security (HST). 2015.
    [Google Scholar]
http://instance.metastore.ingenta.com/content/papers/10.2523/IPTC-19072-MS
Loading
/content/papers/10.2523/IPTC-19072-MS
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error