Computer Science ›› 2018, Vol. 45 ›› Issue (12): 32-41.doi: 10.11896/j.issn.1002-137X.2018.12.005
• Surveys • Previous Articles Next Articles
YANG Wei1, HE Jie2, WAN Ya-dong2, WANG Qin2
CLC Number:
[1]DA XU L,HE W,LI S.Internet of things in industries:A survey[J].IEEE Transactions on Industrial Informatics,2014,10(4):2233-2243. [2]MIORANDI D,SICARI S,DE PELLEGRINI F,et al.Internet of things:vision,applications and research challenges[J].Ad Hoc Networks,2012,10(7):1497-1516. [3]BOTTA A,DE DONATO W,PERSICO V,et al.Integration of cloud computing and internet of things:a survey[J].Future Generation Computer Systems,2016,56(C):684-700. [4]BELLO O,ZEADALLY S.Intelligent device-to-device communication in the internet of things[J].IEEE Systems Journal,2016,10(3):1172-1182. [5]CHI Q,YAN H,ZHANG C,et al.A reconfigurable smart sensor interface for industrial WSN in IoT environment[J].IEEE Transactions on Industrial Informatics,2014,10(2):1417-1425. [6]ROBERT F,JAMES D,PATRICK W,et al.IEEE Standard for Local and Metropolitan Area Networks-Part 15.4:Low-Rate Wireless Personal Area Networks (LR-WPANs) .New York:LAN/MAN Standards Committee,2006. [7]ROBERT F,RICK A,PATRICK W,et al.802.15.4e-2012:IEEE Standard for Local and Metropolitan Area Networks-Part 15.4:Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1 .New York:LAN/MAN Standards Committee,2012. [8]KUSHALNAGAR N,MONTENEGRO G,SCHUMACHER C.IPv6 over low-power wireless personal area networks (6LoW-PANs):Overview,assumptions,problem statement,and goals,RFC 4919 .New York:Internet Engineering Task Force,2007. [9]THUBERT P,WINTER T,BRANDT A,et al.RPL:IPv6 routing protocol for low power and lossy networks .New York:Internet Engineering Task Force,2012. [10]BORMANN C,CASTELLANI A P,SHELBY Z.Coap:An application protocol for billions of tiny internet nodes.IEEE Internet Computing,2012,16(2):62-67. [11]SAJJAD S M,YOUSAF M.Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)[C]∥Information Assurance and Cyber Security.IEEE,2014:9-14. [12]YANG W,WANG Q,QI Y,et al.Time Synchronization Attacks in IEEE802.15.4e Networks[C]∥International Conference on Identification,Information and Knowledge in the Internet of Things.IEEE,2014:166-169. [13]SALEEM S,ULLAH S,KWAK K S.A study of IEEE 802.15.4security framework for wireless body area networks[J].Sensors,2011,11(2):1383-1395. [14]JO M,HAN L,TAN N D,et al.A survey:energy exhausting attacks in MAC protocols in WBANs[J].Telecommunication Systems,2015,58(2):153-164. [15]LE A,LOO J,LASEBAE A,et al.The impact of rank attack on network topology of routing protocol for low-power and lossy networks[J].IEEE Sensors Journal,2013,13(10):3685-3692. [16]WALLGREN L,RAZA S,VOIGT T.Routing Attacks andCountermeasures in the RPL-Based Internet of Things.International Journal of Distributed Sensor Networks,2013,2013(2):167-174. [17]LE A,LOO J,LUO Y,et al.The impacts of internal threats towards Routing Protocol for Low power and lossy network performance[C]∥Computers and Communications.IEEE,2013:789-794. [18]KIM T,KIM S H,YANG J,et al.Neighbor table based shortcut tree routing in ZigBee wireless networks[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(3):706-716. [19]HART Communication Foundation.wirelessHART7.1 Specifi-cation [EB/OL]. [2009-04-02].http://www.hartcomm2.org/hart_protocol/protocol/protocol_specs_popup.html. [20]MONTERO S,GOZALVEZ J,SEPULCRE M,et al.ISA-100.11a-2011:Wireless Systems for Industrial Automation:Process Control and Related Applications .New York:International Society of Automation (ISA) Standards Committee,2011. [21]IEC/PAS 62601.Industrial communication network-fieldbusspecifications WIA-PA communication network and communication profile[EB/OL].http://www.iec.ch. [22]PISTER K S J,DOHERTY L.TSMP:Time Synchronized Mesh Protocol[C]∥Proceedings of the IASTED International Symposium on Distributed Sensor Networks (DSN08).IEEE,2008:391-398. [23]WATTEYNE T,LANZISERA S,MEHTA A,et al.Mitigating Multipath Fading through Channel Hopping in Wireless Sensor Networks[C]∥IEEE International Conference on Communications (ICC).2010:1-5. [24]DUJOVNE D,WATTEYNE T,VILAJOSANA X,et al.6TiSCH:deterministic IP-enabled industrial internet (of things)[J].IEEE Communications Magazine,2014,52(12):36-41. [25]RAZA S,TRABALZA D,VOIGT T.6LoWPAN compressedDTLS for CoAP[C]∥2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS).IEEE,2012:287-289. [26]KOTHMAYR T,SCHMITT C,HU W,et al.DTLS based security and two-way authentication for the Internet of Things[J].Ad Hoc Networks,2013,11(8):2710-2723. [27]SEITZ L,GERDES S,SELANDER G,et al.Use Cases for Authentication and Authorization in Constrained Environments .New York:Internet Engineering Task Force,2016. [28]STANISLOWSKI D,VILAJOSANA X,WANG Q,et al.Adaptive synchronization in IEEE802.15.4e networks[J].IEEE Transactions on Industrial Informatics,2014,10(1):795-802. [29]WATTEYNE T,WEISS J,DOHERTY L,et al.IndustrialIEEE802.15.4e networks:Performance and trade-offs[C]∥2015 IEEE International Conference on Communications (ICC).IEEE,2015:604-609. [30]VILAJOSANA X,WANG Q,CHRAIM F,et al.A realisticenergy consumption model for TSCH networks[J].IEEE Sen-sors Journal,2014,14(2):482-489. [31]ROBERT F,RICK A,PATRICK W,et al.802.15.4-2011:IEEE Standard for Local and Metropolitan Area Networks-Part 15.4:Low-Rate Wireless Personal Area Networks (LR-WPANs) .New York:LAN/MAN Standards Committee,2011. [32]SCIANCALEPORE S,PIRO G,VOGLI E,et al.LICITUS:Alightweight and standard compatible framework for securing layer-2 communications in the IoT[J].Computer Networks,2016,108(1):66-77. [33]SCIANCALEPORE S,VUCˇINIC′ M,PIRO G,et al.Link-layer security in TSCH networks:effect on slot duration.Transactions on Emerging Telecommunications Technologies,2017,28(1):80-92. [34]VILAJOSANA X,TUSET P,WATTEYNE T,et al.Open-Mote:Open-Source Prototyping Platform for the Industrial IoT[C]∥Eai International Conference on Ad Hoc Networks.2015:211-222. [35]WATTEYNE T,VILAJOSANA X,KERKEZ B,et al.Open-WSN:a standards-based low-power wireless development environment[J].Transactions on Emerging Telecommunications Technologies,2012,23(5):480-493. [36]SAJJAD S M,YOUSAF M.Security analysis of IEEE 802.15.4 MAC in the context of Internet of Things (IoT)[C]∥2014 Conference on Information Assurance and Cyber Security (CIACS).IEEE,2014:9-14. [37]YANG W,WANG Q,WAN Y,et al.Security Vulnerabilitiesand Countermeasures for Time Synchronization in IEEE802.15.4e Networks[C]∥2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).IEEE,2016:102-107. [38]YANG W,HE J,WAN Y D,et al.Security Countermeasures for Time Synchronization in IEEE802.15.4e-Based Industrial IoT[J].Journal of Computer Research and Development,2017,54(9):2032-2043.(in Chinese) 杨伟,何杰,万亚东,等.基于IEEE802.15.4e标准的工业物联网安全时间同步策略[J].计算机研究与发展,2017,54(9):2032-2043. [39]RAYMOND D R,MARCHANY R C,BROWNFIELD M I,etal.Effects of denial-of-sleep attacks on wireless sensor network MAC protocols[J].IEEE Transactions on Vehicular Technology,2009,58(1):367-380. [40]PERRIG A,SZEWCZYK R,TYGAR J D,et al.SPINS:Security protocols for sensor networks[J].Wireless Networks,2002,8(5):521-534. [41]KARLOF C,SASTRY N,WAGNER D.TinySec:a link layersecurity architecture for wireless sensor networks[C]∥Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems.ACM,2004:162-175. [42]GUNGOR V C,HANCKE G P.Industrial wireless sensor networks:Challenges,design principles,and technical approaches[J].IEEE Transactions on Industrial Electronics,2009,56(10):4258-4265. [43]QUANG P T A,KIM D S.Enhancing real-time delivery of gradient routing for industrial wireless sensor networks[J].IEEE Transactions on Industrial Informatics,2012,8(1):61-68. [44]SALVADORI F,DE CAMPOS M,SAUSEN P S,et al.Monitoring in industrial systems using wireless sensor network with dynamic power management[J].IEEE Transactions on Instrumentation and Measurement,2009,58(9):3104-3111. [45]MONTENEGRO G,KUSHALNAGAR N,HUI J,et al.Transmission of IPv6 Packets over IEEE 802.15.4 Networks∥2012 6th International Conference on Signal Processing and Communication Systems (ICSPCS).IEEE,2007:1-6. [46]THUBERT P,HUI J,SELANDER G,et al.Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks .New York:Internet Engineering Task Force,2011. [47]KUSHALNAGAR N,MONTENEGRO G,SCHUMACHER C,et al.IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs):Overview,Assumptions,Problem Statement,Goals .New York:Internet Engineering Task Force,2007. [48]MONTENEGRO G,KUSHALNAGAR N,HUI J,et al.Transmission of IPv6 Packets Over IEEE 802.15.4 Networks .New York:Internet Engineering Task Force,2007. [49]KIM E,KASPAR D,GOMEZ C,et al.Problem Statement and Requirements for IPv6 over Low-Power Wireless Personal Area Network(6LoWPAN) Routing.New York:Internet Engineering Task Force,2012. [50]HUMMEN R,HILLER J,WIRTZ H,et al.6LoWPAN frag-mentation attacks and mitigation mechanisms[C]∥ACM Conference on Security and Privacy in Wireless and Mobile Networks.ACM,2013:55-66. [51]RAZA S,DUQUENNOY S,HÖGLUND J,et al.Secure communication for the Internet of Things—a comparison of link-la-yer security and IPsec for 6LoWPAN[J].Security & Communication Networks,2014,7(12):2654-2668. [52]ALEXANDER R,TSAO T,DAZA V,et al.A Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs).New York:Internet Engineering Task Force,2015. [53]TRIPATHI J,OLIVEIRA J,VASSEUR P,et al.Performanceevaluation of the routing protocol for low-power and lossy networks (RPL) .New York:Internet Engineering Task Force,2012. [54]WINGET N,HUI J,POPA D,et al.Applicability Statement for the Routing Protocol for Low-Power and Lossy Networks (RPL) in Advanced Metering Infrastructure (AMI) Networks .New York:Internet Engineering Task Force,2017. [55]WALLGREN L,RAZA S,VOIGT T.Routing Attacks andCountermeasures in the RPL-based Internet of Things.International Journal of Distributed Sensor Networks,2013,2013(2):167-174. [56]WEEKLY K,PISTER K.Evaluating sinkhole defense tech-niques in RPL networks[C]∥2012 20th IEEE International Conference on Network Protocols (ICNP).IEEE,2012:1-6. [57]LE A,LOO J,LUO Y,et al.The impacts of internal threats towards Routing Protocol for Low power and lossy network performance[C]∥2013 IEEE Symposium on Computers and Communications (ISCC).IEEE,2013:789-794. [58]MAYZAUD A,BADONNEL R,CHRISMENT I.A Taxonomy of Attacks in RPL-based Internet of Things[J].International Journal of Network Security,2016,18(3):459-473. [59]MEDJEK F,TANDJAOUI D,ABDMEZIEM M R,et al.Analytical evaluation of the impacts of Sybil attacks against RPL under mobility[C]∥2015 12th International Symposium on Programming and Systems (ISPS).IEEE,2015:1-9. [60]DVIR A,BUTTYAN L.VeRA-version number and rank au-thentication in rpl[C]∥2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS).IEEE,2011:709-714. [61]LANDSMANN M,WAHLISCH M,SCHMIDT T.Topo-logy Authentication in RPL[C]∥Computer Communications Workshops.IEEE,2013:73-74. [62]PERREY H,LANDSMANN M,UGUS O,et al.TRAIL:Topo-logy Authentication in RPL[C]∥International Conference on Embedded Wireless Systems and Networks.Junction Publi-shing,2015:59-64. [63]ZHANG L,FENG G,QIN S.Intrusion detection system forRPL from routing choice intrusion[C]∥2015 IEEE Internatio-nal Conference on Communication Workshop (ICCW).IEEE,2015:2652-2658. [64]LE A,LOO J,LASEBAE A,et al.The impact of rank attack on network topology of routing protocol for low-power and lossy networks[J].IEEE Sensors Journal,2013,13(10):3685-3692. [65]DJEDJIG N,TANDJAOUI D,MEDJEK F.Trust-based RPL for the Internet of Things[C]∥2015 IEEE Symposium on Compu-ters and Communication (ISCC).IEEE,2015:962-967. [66]DJEDJIG N,TANDJAOUI D,MEDJEK F,et al.New trust metric for the RPL routing protocol[C]∥2017 8th International Conference on Information and Communication Systems (ICICS).IEEE,2017:328-335. [67]JIANG N,LIU J,XIAO W,et al.Routing attacks prevention mechanism for RPL based on micropayment scheme[C]∥International Conference on Wireless Communications,Signal Processing and Networking (WiSPNET).IEEE,2016:835-841. [68]CHZE P L R,LEONG K S.A secure multi-hop routing for IoT communication[C]∥2014 IEEE World Forum on Internet of Things (WF-IoT).IEEE,2014:428-432. [69]HUMMEN R,WIRTZ H,ZIEGELDORF J H,et al.Tailoring end-to-end IP security protocols to the Internet of Things[C]∥2013 21st IEEE International Conference on Network Protocols (ICNP).IEEE,2013:1-10. [70]BLAKE-WILSON S,NYSTROM M,HOPWOOD D,et al.Transport layer security (TLS) extensions .New York:Internet Engineering Task Force,2006. [71]SEO H,SHIM K A,KIM H.Performance enhancement of TinyECC based on multiplication optimizations[J].Security and Communication Networks,2013,6(2):151-160. [72]KEOH S L,KUMAR S S,TSCHOFENIG H.Securing the internet of things:A standardization perspective[J].IEEE Internet of Things Journal,2014,1(3):265-275. [73]GRANJAL J,MONTEIRO E,SILVA J S.Security in the integration of low-power Wireless Sensor Networks with the Internet:A survey[J].Ad Hoc Networks,2015,24:264-287. [74]RAZA S,SHAFAGH H,HEWAGE K,et al.Lithe:Lightweight secure CoAP for the internet of things[J].IEEE Sensors Journal,2013,13(10):3711-3720. [75]CAPOSSELE A,CERVO V,DE CICCO G,et al.Security as a CoAP resource:an optimized DTLS implementation for the IoT[C]∥2015 IEEE International Conference on Communications (ICC).IEEE,2015:549-554. [76]COLESANTI U M,LO RUSSO A,PAOLI M,et al.Introducing the magonode platform[C]∥Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems.ACM,2013. [77]AL-FUQAHA A,GUIZANI M,MOHAMMADI M,et al.Internet of things:A survey on enabling technologies,protocols,and applications[J].IEEE Communications Surveys & Tutorials,2015,17(4):2347-2376. [78]KARAGIANNIS V,CHATZIMISIOS P,VAZQUEZ-GAL-LEGO F,et al.A survey on application layer protocols for the internet of things[J].Transaction on IoT and Cloud Computing,2015,3(1):11-17. |
[1] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[2] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[3] | ZHU Wen-tao, LAN Xian-chao, LUO Huan-lin, YUE Bing, WANG Yang. Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN [J]. Computer Science, 2022, 49(6A): 378-383. |
[4] | WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473. |
[5] | WANG Jian. Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving [J]. Computer Science, 2022, 49(6A): 575-580. |
[6] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[7] | DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24. |
[8] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[9] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[10] | ZHAO Geng, SONG Xin-yu, MA Ying-jie. Secure Data Link of Unmanned Aerial Vehicle Based on Chaotic Sub-carrier Modulation [J]. Computer Science, 2022, 49(3): 322-328. |
[11] | ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337. |
[12] | FENG Deng-guo. New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [J]. Computer Science, 2022, 49(1): 1-6. |
[13] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[14] | LI Jia-ming, ZHAO Kuo, QU Ting, LIU Xiao-xiang. Research and Analysis of Blockchain Internet of Things Based on Knowledge Graph [J]. Computer Science, 2021, 48(6A): 563-567. |
[15] | WU Shao-qian, LI Xi-ming. Authenticable Encrypted Secure Communication Based on Adversarial Network [J]. Computer Science, 2021, 48(5): 328-333. |
|