A Secure Trust-Based Key Distribution With Self-Healing for Internet of Things
暂无分享,去创建一个
Haibo Hong | Song Han | Bailin Yang | Mianxue Gu | Jianhong Lin | Mengjiao Kong | Haibo Hong | Song Han | Jianhong Lin | Bailin Yang | Mengjiao Kong | Mianxue Gu
[1] Wen-Tsai Sung,et al. Evidence-based multi-sensor information fusion for remote health care systems , 2013 .
[2] Sourav Mukhopadhyay,et al. Generalized Self-healing Key Distribution Using Vector Space Access Structure , 2008, Networking.
[3] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[4] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[5] Germán Sáez. On Threshold Self-healing Key Distribution Schemes , 2005, IMACC.
[6] Tomasz Rams,et al. A Survey of Group Key Distribution Schemes With Self-Healing Property , 2013, IEEE Communications Surveys & Tutorials.
[7] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[8] Karl Aberer,et al. Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems , 2013, IEEE Trans. Inf. Forensics Secur..
[9] Chao Yang,et al. Quantum key distribution network: Optimal secret-key-aware routing method for trust relaying , 2018, China Communications.
[10] Fadi Al-Turjman,et al. A Novel Security Model for Cooperative Virtual Networks in the IoT Era , 2018, International Journal of Parallel Programming.
[11] Choong Seon Hong,et al. A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks , 2006, ICDCIT.
[12] Jun Luo,et al. A logic-route key tree based group key management scheme for wireless sensor networks , 2013, 2013 IEEE/CIC International Conference on Communications in China (ICCC).
[13] Theodore B. Zahariadis,et al. A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..
[14] Huifang Chen,et al. One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks , 2013, Ad Hoc Networks.
[15] Hee Yong Youn,et al. A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks , 2005, CIS.
[16] V. S. Janani,et al. An Efficient Genetic Based Broadcast Stateless Group Key Management Scheme with Dynamic Rekeying in Mobile Ad-Hoc Networks , 2019, Wirel. Pers. Commun..
[17] Ying Wang,et al. An ID-based broadcast encryption scheme for key distribution , 2005, IEEE Trans. Broadcast..
[18] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[19] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[20] Fadi Al-Turjman,et al. An overview of security and privacy in smart cities' IoT communications , 2019, Trans. Emerg. Telecommun. Technol..
[21] Shan Zhong,et al. An IPv6 address configuration scheme for wireless sensor networks based on location information , 2012, Telecommun. Syst..
[22] Tomasz Rams,et al. Long-Lived Self-Healing Group Key Distribution Scheme with Backward Secrecy , 2013, 2013 Conference on Networked Systems.
[23] Yang Bo,et al. Mutual authentication and key distribution protocol based on the Trust-Third-Party in mobile RFID environment , 2018, 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA).
[24] T. J. Swamy,et al. Link evaluation of uniform grid based wireless sensor networks to base station with leveling and clustering , 2013, 2013 International Conference on Computer Communication and Informatics.
[25] Mario Di Francesco,et al. Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.
[26] Sinem Alturjman,et al. Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications , 2018, IEEE Transactions on Industrial Informatics.
[27] Guangjie Han,et al. Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..
[28] Jiankun Hu,et al. An Efficient Self-Healing Key Distribution Scheme with Constant-Size Personal Keys for Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.
[29] Muhammad Khurram Khan,et al. BAN Logic-Based Security Proof for Mobile OTP Authentication Scheme , 2012 .
[30] Sourav Mukhopadhyay,et al. Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability , 2007, ISPA.
[31] Muhammad Bilal,et al. An Authentication Protocol for Future Sensor Networks , 2017, Sensors.
[32] Xiaojiang Du,et al. An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[33] Jin-Hee Cho,et al. Trust threshold based public key management in mobile ad hoc networks , 2016, Ad Hoc Networks.
[34] Rabi N. Mahapatra,et al. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[35] Félix Gómez Mármol,et al. TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..
[36] S. Sitharama Iyengar,et al. TGAR: Trust Dependent Greedy Anti-Void Routing in Wireless Sensor Networks (WSNs) , 2013 .
[37] Jingsha He,et al. Enabling end-to-end secure communication between wireless sensor networks and the Internet , 2012, World Wide Web.
[38] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[39] Jiankun Hu,et al. A mutual-healing key distribution scheme in wireless sensor networks , 2011, J. Netw. Comput. Appl..
[40] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[41] Maode Ma,et al. A collusion-resilient self-healing key distribution scheme for wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[42] José María Sierra,et al. A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.
[43] Reihaneh Safavi-Naini,et al. A Secure Re-keying Scheme with Key Recovery Property , 2002, ACISP.
[44] Atsuko Miyaji,et al. How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[45] J. Wenny Rahayu,et al. Trustworthy-based efficient data broadcast model for P2P interaction in resource-constrained wireless environments , 2012, J. Comput. Syst. Sci..
[46] Ju-Sung Kang,et al. An efficient key distribution scheme with self-healing property , 2005, IEEE Communications Letters.
[47] Edith C. H. Ngai,et al. On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.
[48] K. J. Ray Liu,et al. Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes , 2007, IEEE Transactions on Information Forensics and Security.
[49] Yongquan Cai,et al. Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid , 2018, Wireless Personal Communications.
[50] Jiankun Hu,et al. Self-Healing Key Distribution Schemes for Wireless Networks: A Survey , 2011, Comput. J..
[51] Sourav Mukhopadhyay,et al. Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains , 2007, ACNS.