|
[1] B.-C. Choi, S.-H. Lee, J.-C. Na, and J.-H. Lee, “Secure firmware validation and update for consumer devices in home networking,” IEEE Transactions on Consumer Electronics, vol. 62, no. 1, pp. 39-44, 2016. [2] A. Mohan, “Cyber Security for Personal Medical Devices Internet of Things,” Distributed Computing in Sensor Systems (DCOSS), 2014 IEEE International Conference on. pp. 372-374, 2014. [3] “IoT security threats are skyrocketing, AT&T reveals, ” [Online]. Available:http://www.fiercewireless.com/wireless/iot-security-threats-are-skyrocketing-at-t-reveals (Accessed: March, 2017) [4] “Gartner Identifies the Top 10 Internet of Things Technologies for 2017 and 2018, ” [Online]. Available: http://www.gartner.com/newsroom/id/3221818 (Accessed: March, 2017) [5] M. Steger, C. Boano, M. Karner, J. Hillebrand, W. Rom, and K. Romer, “SecUp: Secure and Efficient Wireless Software Updates for Vehicles,” Digital System Design (DSD), 2016 Euromicro Conference on. pp. 628-636, 2016. [6] 「為何駭客特別愛用IoT裝置當作攻擊跳板,裝置管理權責劃分不易是主因」[Online]. Available: http://www.ithome.com.tw/news/112861 (Accessed: March, 2017) [7] H. Krawczyk, M. Bellare, and R. Canetti, “RFC 2104: HMAC: Keyed-hashing for message authentication,” 1997. [Online]. Available: https://tools.ietf.org/html/rfc2104 (Accessed: April, 2017) [8] “SEC 1: Elliptic Curve Cryptography, ” [Online]. Available: http://www.secg.org/sec1-v2.pdf (Accessed: May, 2017) [9] “MQTT Version 3.1.1 Plus Errata 01, ” [Online]. Available: http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/mqtt-v3.1.1.html (Accessed: April, 2017) [10] “HiveMQ MQTT Essentials, ” [Online]. Available: http://www.hivemq.com/blog/mqtt-essentials/ (Accessed: April, 2017) [11] S. Lee, H. Kim, D.-K. Hong, and H. Ju,, “Correlation analysis of MQTT loss and delay according to QoS level,” Information Networking (ICOIN), 2013 International Conference on. pp. 714-717, 2013. [12] P. Thota, and Y. Kim, “Implementation and Comparison of M2M Protocols for Internet of Things,” Applied Computing and Information Technology/3rd Intl Conf on Computational Science/Intelligence and Applied Informatics/1st Intl Conf on Big Data, Cloud Computing, Data Science & Engineering (ACIT-CSII-BCD), 2016 4th Intl Conf on. pp. 43-48, 2016. [13] “The Constrained Application Protocol, ” [Online]. Available: https://tools.ietf.org/html/rfc7252 (Accessed: April, 2017) [14] A. J. Poulter, S. J. Johnston, and S. J. Cox, “SRUP: The secure remote update protocol,” Internet of Things (WF-IoT), 2016 IEEE 3rd World Forum on. pp. 42-47, 2016. [15] A. Niruntasukrat, C. Issariyapat, P. Pongpaibool, K. Meesublak, P. Aiumsupucgul, and A. Panya, “Authorization mechanism for MQTT-based Internet of Things,” Communications Workshops (ICC), 2016 IEEE International Conference on. pp. 290-295, 2016. [16] M. Singh, M. Rajan, V. Shivraj, and P. Balamuralidhar,“Secure MQTT for Internet of Things (IoT), ” Communication Systems and Network Technologies (CSNT), 2015 Fifth International Conference on. pp. 746-751, 2015 [17] A. K. Ranjan, and M. Hussain, “Terminal Authentication in M2M Communications in the Context of Internet of Things,” Procedia Computer Science, vol. 89, pp. 34-42, 2016. [18] Lavanya, Natarajan, “Lightweight Authentication for COAP based IOT,” Proceedings of the 6th International Conference on the Internet of Things(IoT), pp. 167-168, 2016. [19] Omaimah Omar Bamasag and Kamal Youcef-Toumi, “Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme,” Proceedings of the 2015 Workshop on Embedded Systems Security (WESS'15), Amsterdam, The Netherlands, 2015. [20] I. Butun, M. Erol-Kantarci, B. Kantarci, and H. Song, “Cloud-centric multi-level authentication as a service for secure public safety device networks,” IEEE Communications Magazine, vol. 54, no. 4, pp. 47-53, 2016. [21] J. L. Hernandez-Ramos, M. P. Pawlowski, A. J. Jara, A. F. Skarmeta, and L. Ladid, “Toward a Lightweight Authentication and Authorization Framework for Smart Objects,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 4, pp. 690-702, 2015. [22] P. Kumar, A. Gurtov, J. Iinatti, M. Ylianttila, and M. Sain, “Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments,” IEEE Sensors Journal, vol. 16, no. 1, pp. 254-264, 2016. [23] H. Chandra, E. Anggadjaja, P. S. Wijaya, and E. Gunawan, “Internet of Things: Over-the-Air (OTA) firmware update in Lightweight mesh network protocol for smart urban development,” Communications (APCC), 2016 22nd Asia-Pacific Conference on. pp. 115-118, 2016. [24] R. Hassan, K. Markantonakis, and R. N. Akram, “Can You Call the Software in Your Device be Firmware?,” e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on. pp. 188-195, 2016. [25] D. K. Nilsson, L. Sun, and T. Nakajima, “A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs,” GLOBECOM Workshops, pp. 1-5, 2008. |