박사

SH-BlockCC : 클라우드 컴퓨팅과 블럭체인 기술 기반 안전하고 효율적인 사물인터넷 스마트 홈 구조

논문상세정보
' SH-BlockCC : 클라우드 컴퓨팅과 블럭체인 기술 기반 안전하고 효율적인 사물인터넷 스마트 홈 구조' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • blockchain
  • cloud computing
  • internet of things
  • iot
  • security attacks
  • 라우팅 보안공격
  • 블럭체인
  • 사물인터넷(iot)
  • 클라우드컴퓨팅
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
2,195 0

0.0%

' SH-BlockCC : 클라우드 컴퓨팅과 블럭체인 기술 기반 안전하고 효율적인 사물인터넷 스마트 홈 구조' 의 참고문헌

  • https://www.pwc.com/us/en/industry/entertainment-media/publications/ consumer-intelligence-series/assets/pwc-consumer-intelligence-series-iot-connected-home.pdf, accessed on 10 April 2018.
  • Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, “A system for denial-of-service attack detection based on multivariate correlation analysis,” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, no. 2, pp. 447–456, 2014.
  • Z. Tan, A. Jamdagni, X. He, P. Nanda, and R. P. Liu, R.P. “A system for denial-of-service attack detection based on multivariate correlation analysis,” IEEE Transactions on Parallel Distributed Systems, Vol. 25, pp. 447–456, 2014.
  • Y. Song, B. Han, X. Zhang, and D.Yang, “Modeling and simulation of smart home scenarios based on Internet of Things,” In 2012 3rd IEEE international conference on network infrastructure and digital content, IEEE, Beijing, China, pp. 596-600,21-23 Sept. 2012.
  • Y. Meng, W. Zhang, H. Zhu, and X. S. Shen, “Securing consumer IoT in the smart home: architecture, challenges, and countermeasures,” IEEE Wireless Communications, Vol. 25, no. 6, pp. 53–59, 2018.
  • Y. Li, “Design of a key establishment protocol for smart home energy management system,” In Proc. of the Fifth International Conference on Computer Intelligence Communication System and Network (CICSyN), Madrid, Spain, 3pp. 88–93, 5–7 June 201.
  • Y. Huang, H. Li, K. A. Campbell, and Z. Han, “Defending false data injection attack on smart grid network using adaptive CUSUM test,” In Proc. of the 45th Annual Conference on Information Science and System (CISS), Baltimore, MD, USA, pp. 1–6, 23–25 March 2011.
  • X. Sun, S. Men, C. Zhao, and Z. Zhou, “A security authentication scheme in machine‐to‐machine home network service,” Secure Communication Networks, Vol. 8, pp. 2678–2686, 2015.
  • X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, “A survey on the security of blockchain systems,” Future Generation Computer Systems, pp. 1–13, 2017.
  • W. Wang and Z. Lu, “Cyber security in the smart grid: survey and challenges,” Computer Networks, Vol. 57, pp. 1344–371, 2013.
  • V. Sharma, I. You, and G. Kul, “Socializing drones for inter-service operability in ultra-dense wireless networks using blockchain,” In Proc. of the 2017 International Workshop on Managing Insider Security Threats, Dallas, Texas, USA, pp. 81–84, 2017.
  • T. Mantoro, M. A. Ayu, and S. M. B. Mahmod, “Securing the authentication and message integrity for smart home using smart phone,” In Proc. of the International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, Morocco, pp. 985–989, 14–16 April 2014.
  • T. K. Hui, R. S. Sherratt, and D. D. S nchez, “Major requirements for building smart homes in smart cities based on internet of things technologies,” Future Generation Computer Systems, Vol. 76, pp. 358–369, 2017.
  • T. Dougan and K. Curran, “Man in the browser attacks,” International Journal of Ambient Computing and Intelligence, Vol. pp. 29–39, 2012.
  • S. Yoon, H. Park, and H. S. Yoo, “Security issues on smarthome in IoT environment,” In Proc. of the Conference of Computer Science and Its Applications, Berlin/Heidelberg, Germany, pp. 691–696, 2015.
  • S. Singh, Y. S. Jeong, and J. H. Park, “A survey on cloud computing security: issues, threats, and solutions,” Journal of Network Computer Applications, Vol. 75, pp. 200–222, 2016.
  • S. Singh, P. K. Sharma, and J. H. Park, “SH-SecNet: an enhanced secure network architecture for the diagnosis of security threats in a smart home,” Sustainability, Vol. 9, no. 4, pp. 513–532, 2017.
  • S. Singh, P. K. Sharma, S. Y. Moon, and J. H. Park, “EH-GC: an efficient and secure architecture of energy harvesting green cloud infrastructure,” Sustainability, Vol. 9, no. 4, pp. 673–691, 2017.
  • S. Singh, I.H. Ra, W. Meng, M. Kaur, and G.H. Cho, “SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology”, International Journal of Distributed Sensor Networks, 15(4), pp. 1-18, 2019.
  • S. R. Moosavi, T. N. Gia, E. Nigussie, A. M. Rahmani, S. Virtanen, H. Tenhunen, and J. Isoaho, “End-to-end security scheme for mobility enabled healthcare internet of things,” Future Generation Computer Systems, Vol. 64, pp.108–124, 2016.
  • S. Demetriou , N. Zhang, Y. Lee, X. Wang, C. Gunter, X. Zhou, and M. Grace, “Guardian of the HAN: thwarting mobile attacks on smart-home devices using OS-level situation awareness,” arXivpreprint arXiv:1703.01537, pp. 1–19. 2017.
  • S. Bin and L. Jun, “Building energy efficiency policies in China: status report,” Global Building Performance Network, pp. 1–12, 2012.
  • S. A. Mehdi, J. Khalid, and S. A. Khayam, “Revisiting traffic anomaly detection using software defined networking,” In Proc. of International Workshop on Recent Advances in Intrusion Detection, Berlin, Heidelberg, pp. 161–180, 2011.
  • R. A. Rahman and B. Shah, “Security analysis of IoT protocols: a focus in CoAP,” In Proc. of the International Conference on Big Data and Smart City (ICBDSC), Muscat, Oman, pp. 1-7, 15–16 March 2016.
  • Q. Huang, X. Li, and M. Shaurette, M, “Integrating Li-Fi wireless communication and energy harvesting wireless sensor for next generation building management,” arXiv 2014, arXiv preprint arXiv:1602.07399, pp. 1–7, 2014.
  • Pirbhulal, Sandeep, H. Zhang, Md. E. Alahi, H. Ghayvat, S. Mukhopadhyay, Y. T. Zhang, and W. Wu, “A novel secure IoT-based smart home automation system using a wireless sensor network,” Sensors, Vol. 17, no. 1, pp. 1-19, 2017.
  • P. Siano, “Demand response and smart grids—a survey,” Renewable Sustainable Energy Review, Vol. 30, pp. 461–478, 2014.
  • P. N. Balasooriya, S. Wibowo, and M. Wells, “Green cloud computing and economics of the cloud: moving towards sustainable future,” GSTF Journal on Computing, Vol. 5, no. 1, pp. 15–20, 2016.
  • P. K. Sharma, S. Singh, and J. H. Park, “OpCloudSec: open cloud software defined wireless network security for the internet of things,” Computer Communications, Vol. 122, pp. 1–8, 2018.
  • P. K. Sharma, S. Singh, Y. S. Jeong, and J. H. Park, “DistBlockNet: a distributed blockchains-based secure SDN architecture for IoT networks,” IEEE Communications Magazine, Vol. 55, no. 9, pp. 78–85, 2017.
  • P. K. Sharma, S. Rathore, and J. H. Park, “DistArch-SCNet: blockchain-based distributed architecture with Li-Fi communication for a scalable smart city network,” IEEE Consumer Electronics Magazine, Vol. 7, no. 4, pp. 55–64, 2018.
  • P. K. Sharma, J. H. Park, Y. S. Jeong, and J. H. Park, “Shsec: SDN based secure smart home network architecture for internet of things,” Mobile Networks and Applications, Vol. 24, no. 3 pp. 913–924, 2019.
  • O. Hamdan, H. Shanableh, I. Zaki, A. R. Al-Ali, and T. Shanableh, “IoT-based interactive dual mode smart home automation,” In Proc. of the IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, pp. 1-2, 11–13 Jan. 2019.
  • N. Komninos, E. Philippou, and A. Pitsillides, “Survey in smart grid and smart home security: issues, challenges and countermeasures,” IEEE Communication Survey &Tutorials, Vol. 16, pp. 1933–1954, 2014.
  • M. R. Alam, M. B. Reaz, and M. A. Ali, “A review of smart homes—past, present, and future,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), Vol. 46, no. 6, pp. 1190–1203, 2012.
  • M. Nabeel, S. Kerr, X. Ding, and E. Bertino, “Authentication and key management for advanced metering infrastructures utilizing physically unclonable functions,” In Proc. of the IEEE Third International Conference on Smart Grid Communication (SmartGridComm), Tainan, Taiwan, pp. 324–329, 5–8 Nov. 2012.
  • M. Khan, S. Din, S. Jabbar, M. Gohar, H. Ghayvat, and S. C. Mukhopadhyay, “Context-aware low power intelligent smarthome based on the internet of things,” Computers & Electrical Engineering, Vol. 52, pp. 208–222, 2016.
  • M. Amer, A. Naaman, N. K. M’Sirdi, and A. M. El-Zonkoly, “Smart home energy management systems survey,” In Proc. of the 2014 International Conference on Renewable Energies for Developing Countries (REDEC), Beirut, Lebanon, pp. 1–7, 26–27 Nov. 2014.
  • M. A. Chaqfeh and N. Mohamed, “Challenges in middleware solutions for the internet of things,” In Proc. of the International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, USA. pp. 21-26, 21–25 May 2012.
  • L. D. Xu, W. He, and S. Li, “Internet of things in industries: a survey,” IEEE Transactions on Industrial Informatics, Vol. 10, no. 4, pp. 2233-2243, 2014.
  • Kodali, R. Kishore, V. Jain, S. Bose, and L. Boppana, “IoT based smart security and home automation system,” In Proc. of the International conference on computing, communication and automation (ICCCA), Nodia, India, pp. 1286–1289, 29-30 April 2016.
  • K. Kok, S. Karnouskos, D. Nestle, A. Dimeas, A. Weidlich, C. Warmer, and P. Strauss, “Smart houses for a smart grid,” In Proc. of the 20th International Conference and Exhibition on Electricity Distribution-Part 1, Prague, Czech Republic, pp. 1-4, 8–11 June 2009.
  • J. Synnott, C. Nugent, and P. Jeffers, “Simulation of smart home activity datasets,” Sensors, Vol. 15, no. 6, pp. 14162–14179, 2015.
  • J. Byun, B. Jeon, J. Noh, Y. Kim, and S. Park, “An intelligent self-adjusting sensor for smart home services based on ZigBee communications,” IEEE Transactions on Consumer Electronics, Vol. 58, 58, no. 3, pp. 794–802, 2012.
  • G. M. Toschi, L. B. Campos, and C. E. Cugnasca, “Home automation networks: a survey,” Computer Standards & Interfaces, Vol. 50, pp. 42–54, 2017.
  • G. Acs and C. Castelluccia, “Dream: differentially private smart metering,” arXiv preprint arXiv:1201.2531, pp. 1–25, 2012.
  • E. Ahvar, N. Daneshgar-Moghaddam, A. M. Ortiz, G. M. Lee, and N. Crespi, “On analyzing user location discovery methods in smart homes: a taxonomy and survey,” Journal of Network and Computer Applications, Vol. 76, pp. 76: 75–86, 2016.
  • D. Shin, V. Sharm, J. Kim, S. Kwon, and I. You, “Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks,” IEEE Access, Vol. 5, pp. 11100–11117, 2017.
  • D. Cook, “CASAS smart home Project,” http://www.ailab.wsu.edu/casas/ accessed on 10 October 2017.
  • C. Lu, “Overview of security and privacy issues in the internet of things,” https://www.cse.wustl.edu/~jain/cse574-14/ftp/security.pdf, pp. 1–11, 2014.
  • B. L. R. Stojkoska and K. V. Trivodaliev, “A review of internet of things for smart home: challenges and solutions,” Journal of Cleaner Production, Vol. 140, pp. 1454–1464, 2017.
  • A. Jacobsson, M. Boldt, and B. Carlsson, “A risk analysis of a smart home automation system,” Future Generation Computer Systems, Vol. 56, pp. 719–733, 2016.
  • A. Dorri, S. S. Kanhere, and R. Jurdak, “Blockchain in internet of things: challenges and solutions,” arXiv preprint arXiv:1608.05187, pp. 1–13, 2016.
  • A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks,” Computer communications, Vol. 30, no. 14–15, pp. 2826-2841, 2007.