RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Two-Phase Security Protection for the Internet of Things Object

        Vera Suryani,Selo Sulistyo,Widyawan Widyawan 한국정보처리학회 2018 Journal of information processing systems Vol.14 No.6

        Securing objects in the Internet of Things (IoT) is essential. Authentication model is one candidate to securean object, but it is only limited to handle a specific type of attack such as Sybil attack. The authenticationmodel cannot handle other types of attack such as trust-based attacks. This paper proposed two-phasesecurity protection for objects in IoT. The proposed method combined authentication and statistical models. The results showed that the proposed method could handle other attacks in addition to Sybil attacks, such asbad-mouthing attack, good-mouthing attack, and ballot stuffing attack.

      • KCI등재

        Internet of Things (IoT) Framework for Granting Trust among Objects

        Vera Suryani,Selo Sulistyo,Widyawan Widyawan 한국정보처리학회 2017 Journal of information processing systems Vol.13 No.6

        The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible forboth consuming and providing services. Undue access from irresponsible activities becomes an interestingissue to address. Maintenance of data integrity and privacy of objects is important from the perspective ofsecurity. Privacy can be achieved through various techniques: password authentication, cryptography, and theuse of mathematical models to assess the level of security of other objects. Individual methods like these areless effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworksare considered better, regardless of the framework model used, whether centralized, semi-centralized, ordistributed ones. In this paper, we propose a new semi-centralized security framework that aims to improveprivacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputationcoordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object todetermine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can beused as an alternative solution for improving security in the IoT.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼