Layer based security in Narrow Band Internet of Things (NB-IoT)
暂无分享,去创建一个
Manoj Kumar | Rakesh Kumar Jha | Shubha Jain | Haneet Kour | Puja | R. Jha | Haneet Kour | Shubha Jain | Puja | Manoj Kumar
[1] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[2] Sema F. Oktug,et al. Internet-of-Things security: Denial of service attacks , 2015, 2015 23nd Signal Processing and Communications Applications Conference (SIU).
[3] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[4] Rakesh Kumar Jha,et al. NB-IoT Security: A Survey , 2020, Wireless Personal Communications.
[5] Hong-Han Shuai,et al. Eavesdropping prevention for heterogeneous Internet of Things systems , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[6] Walid Saad,et al. Jamming in the Internet of Things: A Game-Theoretic Perspective , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[7] Sanjeev Jain,et al. A Survey on Energy Efficient Narrowband Internet of Things (NBIoT): Architecture, Application and Challenges , 2019, IEEE Access.
[8] Nasir Ghani,et al. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.
[9] Dipti Jadhav,et al. Security threats in the application layer in IOT applications , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[10] Weidang Lu,et al. Small-Cell Assisted Secure Traffic Offloading for Narrowband Internet of Thing (NB-IoT) Systems , 2018, IEEE Internet of Things Journal.
[11] Wenhao Wang,et al. A Replay-Attack Resistant Authentication Scheme for the Internet of Things , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[12] Ke Xu,et al. Mobile Mashup: Architecture, Challenges and Suggestions , 2009, 2009 International Conference on Management and Service Science.
[13] Sana Hoor Jokhio,et al. Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..
[14] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[15] Saru Kumari,et al. Comments on “Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0” , 2020, IEEE Internet of Things Journal.
[16] Sanjeev Jain,et al. Bandwidth Spoofing and Intrusion Detection System for Multistage 5G Wireless Communication Network , 2018, IEEE Transactions on Vehicular Technology.
[17] Mohsen Guizani,et al. Secure and Lightweight Authentication Scheme for Smart Metering Infrastructure in Smart Grid , 2020, IEEE Transactions on Industrial Informatics.
[18] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[19] Biplab Sikdar,et al. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.
[20] Ouajdi Korbaa,et al. A survey on attacks in Internet of Things based networks , 2017, 2017 International Conference on Engineering & MIS (ICEMIS).
[21] Phone Lin,et al. A survey on NB-IoT downlink scheduling: Issues and potential solutions , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[22] Emil C. Lupu,et al. Detecting Malicious Data Injections in Event Detection Wireless Sensor Networks , 2015, IEEE Transactions on Network and Service Management.
[23] Ali Farrokhtala,et al. Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).
[24] Jemal H. Abawajy. Enhancing RFID Tag Resistance against Cloning Attack , 2009, 2009 Third International Conference on Network and System Security.
[25] Siobhán Clarke,et al. Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.
[26] Abhishek Roy,et al. Narrowband Internet of Things: A Comprehensive Study , 2020, Comput. Networks.
[27] Georges Kaddoum,et al. Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[28] Yuxiang Chen,et al. IoT-based smart homes: A review of system architecture, software, communications, privacy and security , 2018, Internet Things.
[29] Ralf Steinmetz,et al. Threat as a Service?: Virtualization's Impact on Cloud Security , 2012, IT Professional.
[30] Tarik Taleb,et al. UAV-Based IoT Platform: A Crowd Surveillance Use Case , 2017, IEEE Communications Magazine.
[31] Dimitri Konstantas,et al. A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model , 2018 .
[32] Byung-Seo Kim,et al. Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.
[33] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[34] Eduardo B. Fernández,et al. An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.
[35] K SudeendraKumar,et al. Security Enhancements to System on Chip Devices for IoT Perception Layer , 2017, 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS).
[36] Chao Gao,et al. Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.
[37] Nirwan Ansari,et al. A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[38] Olav Tirkkonen,et al. NB-IoT Technology Overview and Experience from Cloud-RAN Implementation , 2017, IEEE Wireless Communications.
[39] Albert Y. Zomaya,et al. A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks , 2019, IEEE Transactions on Network and Service Management.