Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique
暂无分享,去创建一个
[1] Shuang-Hua Yang,et al. A zigbee-based home automation system , 2009, IEEE Transactions on Consumer Electronics.
[2] Freddy K. Santoso,et al. Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).
[3] Soma Bandyopadhyay,et al. Lightweight security scheme for vehicle tracking system using CoAP , 2013, ASPI '13.
[4] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[5] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[6] Saleem Ullah,et al. Security Issues in the Internet of Things (IoT): A Comprehensive Study , 2017 .
[7] Runtong Zhang,et al. An Improved Identity Authentication Scheme for Internet of Things in Heterogeneous Networking Environments , 2013, 2013 16th International Conference on Network-Based Information Systems.
[8] Qusay H. Mahmoud,et al. A context-aware authentication framework for smart homes , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).
[9] Moncef Gabbouj,et al. ShakeMe: Key Generation from Shared Motion , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.
[10] Issa Traoré,et al. Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain , 2019, J. Inf. Secur. Appl..
[11] Ahmad-Reza Sadeghi,et al. Security analysis on consumer and industrial IoT devices , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[12] Yu-Hung Huang,et al. A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).
[13] Md. Mahbubur Rahman,et al. Advanced real time RFID mutual authentication protocol using dynamically updated secret value through encryption and decryption process , 2017, 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE).
[14] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[15] Nitesh Saxena,et al. Accelerometers and randomness: perfect together , 2011, WiSec '11.
[16] Jyotsna P. Gabhane,et al. 3-level secure Kerberos authentication for Smart Home Systems using IoT , 2015, 2015 1st International Conference on Next Generation Computing Technologies (NGCT).
[17] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[18] Jingcheng Wang,et al. A novel mutual authentication scheme for Internet of Things , 2011, Proceedings of 2011 International Conference on Modelling, Identification and Control.
[19] Ruhul Amin,et al. Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks , 2017, Multimedia Tools and Applications.
[20] Xiang Li,et al. The study on the application of BAN logic in formal analysis of authentication protocols , 2005, ICEC '05.
[21] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[22] Ankur Lohachab,et al. ECC based inter-device authentication and authorization scheme using MQTT for IoT networks , 2019, J. Inf. Secur. Appl..
[23] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.