Trust-Based Authentication for Smart Home Systems
暂无分享,去创建一个
[1] Mouzhi Ge,et al. Enhanced network intrusion detection system protocol for internet of things , 2020, SAC.
[2] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[3] Kevin Bouchard,et al. Exploiting Passive RFID Technology for Activity Recognition in Smart Homes , 2015, IEEE Intelligent Systems.
[4] Ahmed Khattab,et al. RFID Security Threats and Basic Solutions , 2017 .
[5] Jiann-Liang Chen,et al. Architecture design and performance evaluation of RFID object tracking systems , 2007, Comput. Commun..
[6] Willy Susilo,et al. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.
[7] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[8] Sheikh Iqbal Ahamed,et al. AnonPri: A secure anonymous private authentication protocol for RFID systems , 2017, Inf. Sci..
[9] Nei Kato,et al. State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow’s Intelligent Network Traffic Control Systems , 2017, IEEE Communications Surveys & Tutorials.
[10] Yuxiang Chen,et al. IoT-based smart homes: A review of system architecture, software, communications, privacy and security , 2018, Internet Things.
[11] Chih-Ming Hsiao,et al. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.
[12] Kire Trivodaliev,et al. A review of Internet of Things for smart home: Challenges and solutions , 2017 .
[13] Saraju P. Mohanty,et al. iTour: The Future of Smart Tourism: An IoT Framework for the Independent Mobility of Tourists in Smart Cities , 2018, IEEE Consumer Electronics Magazine.
[14] Muhammad Asadullah,et al. An overview of home automation systems , 2016, 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI).
[15] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[16] Gul N. Khan,et al. Secure authentication scheme for passive C1G2 RFID tags , 2012, Comput. Networks.
[17] Mouzhi Ge,et al. Self-adaptive RFID Authentication for Internet of Things , 2019, AINA.
[18] Min Chen,et al. An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[19] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[20] Carelin Felix,et al. Home automation using GSM , 2011, 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies.
[21] Andrei Gurtov,et al. Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.
[22] Atul Prakash,et al. Security Implications of Permission Models in Smart-Home Application Frameworks , 2017, IEEE Security & Privacy.
[23] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[24] Jong Hyuk Park,et al. SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home , 2017 .
[25] Aref Meddeb,et al. A secure electric energy management in smart home , 2017, Int. J. Commun. Syst..
[26] Wanlei Zhou,et al. Detecting unauthorized RFID tag carrier for secure access control to a smart building , 2018 .
[27] Yuan-Ting Zhang,et al. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.
[28] Mohsen Machhout,et al. Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag , 2018, Journal of Electronic Testing.
[29] Moussa Ayyash,et al. Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.
[30] Andrei Gurtov,et al. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.
[31] Abdelmalek Azizi,et al. Internet of things security , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).
[32] Mouzhi Ge,et al. An Efficient Mutual Authentication Scheme for Internet of Things , 2020, Internet Things.
[33] Priti Maheshwary,et al. Internet of Things (IoT) for building smart home system , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[34] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[35] Anastasios A. Economides,et al. Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..
[36] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[37] Nafaâ Jabeur,et al. Toward Enforcing Security in Smart Homes Using a Trust-Based Scheme , 2020, AINA Workshops.
[38] Tao Lin,et al. An Enhanced Q Algorithm Based on EPC-C1G2 RFID Protocol , 2016 .
[39] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[40] Mouzhi Ge,et al. Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..
[41] Christof Weinhardt,et al. A blockchain-based smart grid: towards sustainable local energy markets , 2017, Computer Science - Research and Development.
[42] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[43] Walaa Hamouda,et al. A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.
[44] B. B. Gupta,et al. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.