RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재 SCOPUS

      Internet of Things (IoT) Framework for Granting Trust among Objects

      한글로보기

      https://www.riss.kr/link?id=A104501177

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible forboth consuming and providing services. Undue access from irresponsible activities becomes an interestingissue to address. Maintenance of data ...

      The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible forboth consuming and providing services. Undue access from irresponsible activities becomes an interestingissue to address. Maintenance of data integrity and privacy of objects is important from the perspective ofsecurity. Privacy can be achieved through various techniques: password authentication, cryptography, and theuse of mathematical models to assess the level of security of other objects. Individual methods like these areless effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworksare considered better, regardless of the framework model used, whether centralized, semi-centralized, ordistributed ones. In this paper, we propose a new semi-centralized security framework that aims to improveprivacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputationcoordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object todetermine other objects that are considered trusted before the communication process is implemented.
      Evaluation of the proposed framework was done through simulation, which shows that the framework can beused as an alternative solution for improving security in the IoT.

      더보기

      참고문헌 (Reference)

      1 J. Su, "ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things" 33 : 11-18, 2014

      2 A. B. Waluyo, "Trustworthy data delivery in mobile P2P network" 86 : 33-48, 2017

      3 D. Conzon, "The VIRTUS middleware:an XMPP based architecture for secure IoT communications" 1-6, 2012

      4 K. Kang, "Security and privacy mechanism for health internet of things" 20 (20): 64-68, 2013

      5 R. Neisse, "SecKit: a model-based security toolkit for the internet of things" 54 : 60-76, 2015

      6 L. Atzori, "SIoT : giving a social structure to the internet of things" 15 (15): 1193-1195, 2011

      7 Z. Chen, "Privacy-preserving model of IoT based trust evaluation" E100-D (E100-D): 371-374, 2017

      8 A. Samani, "Privacy in internet of things : a model and protection framework" 52 : 606-613, 2015

      9 U. S. Premarathne, "Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications" 88 : 161-177, 2015

      10 H. Sato, "Establishing trust in the emerging era of IoT" 398-406, 2016

      1 J. Su, "ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things" 33 : 11-18, 2014

      2 A. B. Waluyo, "Trustworthy data delivery in mobile P2P network" 86 : 33-48, 2017

      3 D. Conzon, "The VIRTUS middleware:an XMPP based architecture for secure IoT communications" 1-6, 2012

      4 K. Kang, "Security and privacy mechanism for health internet of things" 20 (20): 64-68, 2013

      5 R. Neisse, "SecKit: a model-based security toolkit for the internet of things" 54 : 60-76, 2015

      6 L. Atzori, "SIoT : giving a social structure to the internet of things" 15 (15): 1193-1195, 2011

      7 Z. Chen, "Privacy-preserving model of IoT based trust evaluation" E100-D (E100-D): 371-374, 2017

      8 A. Samani, "Privacy in internet of things : a model and protection framework" 52 : 606-613, 2015

      9 U. S. Premarathne, "Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications" 88 : 161-177, 2015

      10 H. Sato, "Establishing trust in the emerging era of IoT" 398-406, 2016

      11 Subbian Umamaheswari, "Enhanced ANTSEC Framework with Cluster based Cooperative Caching in Mobile Ad Hoc Networks" 한국통신학회 17 (17): 40-46, 2015

      12 V. Suryani, "ConTrust : a trust model to enhance the privacy in internet of things" 10 (10): 30-37, 2017

      13 A. S. Tanenbaum, "Computer Network" Pearson Education Inc 2003

      14 CASAGRAS Partnership, "CASAGRAS final report: RFID and the inclusive model for the internet of things" 2009

      15 E. E. Zakaria, "An integrated security framework for access control and address auto-configuration for MANETs" 253-260, 2015

      16 M. S. Farash, "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment" 36 (36): 152-176, 2016

      17 X. Xu, "An autonomic agent trust model for IoT systems" 21 : 107-113, 2013

      18 C. Zhu, "A novel sensory data processing framework to integrate sensor networks with mobile cloud" 10 (10): 1125-1136, 2016

      19 B. Zhang, "A novel multiple-level trust management framework for wireless sensor networks" 72 : 45-61, 2014

      20 J. Wu, "A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities" 4 : 416-424, 2016

      21 M. Henze, "A comprehensive approach to privacy in the cloud-based internet of things" 56 : 701-718, 2016

      22 A. Sheikhi, "A cloud computing framework on demand side management game in smart energy hubs" 64 : 1007-1016, 2015

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2012-01-01 평가 등재학술지 선정 (등재후보2차) KCI등재
      2011-01-01 평가 등재후보 1차 PASS (등재후보1차) KCI등재후보
      2009-01-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 0.09 0.09 0.09
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.07 0.06 0.254 0.59
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼