Securing the Internet of Things

被引:407
作者
Roman, Rodrigo [1 ]
Najera, Pablo
Lopez, Javier [1 ]
机构
[1] Univ Malaga, Dept Comp Sci, E-29071 Malaga, Spain
关键词
Virtual environments; Protocols; Network security; Wireless sensor networks; Internet; Sensor systems; Virtual objects; Internet of Things; Security protocols; Sensor networks;
D O I
10.1109/MC.2011.291
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the Internet of Things vision, every physical object has a virtual component that can produce and consume services. Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. © 2006 IEEE.
引用
收藏
页码:51 / 58
页数:8
相关论文
共 11 条
  • [1] Akram Hasan, 2008, 2008 3rd International Conference on Systems and Networks Communications, P371, DOI 10.1109/ICSNC.2008.77
  • [2] BROENINK G, 2010, P WORKSH WHAT CAN IN
  • [3] DASKALA B, 2010, FLYING 2 0 ENABLING
  • [4] GARCIAMORCHON O, 2011, SECURITY CONSIDERATI
  • [5] Radomirovic S., 2010, P 1 INT WORKSH SEC I, P6
  • [6] RAZA S, 2011, P WORKSH INT SMART O
  • [7] REKLEITIS E, 2010, P 1 INT WORKSH SEC I
  • [8] ROMAN R, 2011, COMPUTERS ELECT MAR, P147
  • [9] A cross-layer approach for integrating security mechanisms in sensor networks architectures
    Roman, Rodrigo
    Lopez, Javier
    Najera, Pablo
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02) : 267 - 276
  • [10] SARMA A, 2009, WIRELESS PERSONA MAR, P353