A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home Applications
暂无分享,去创建一个
Hippolyte N. Muyingi | Amelia Phillips | Attlee M. Gamundani | Attlee M. Gamundani | H. Muyingi | Amelia Phillips
[1] Vijay Sivaraman,et al. Low-cost flow-based security solutions for smart-home IoT devices , 2016, International Workshop on Ant Colony Optimization and Swarm Intelligence.
[2] Jen-Ho Yang,et al. A user authentication scheme on multi-server environments for cloud computing , 2013, 2013 9th International Conference on Information, Communications & Signal Processing.
[3] Qusay H. Mahmoud,et al. A context-aware authentication framework for smart homes , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).
[4] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[5] Derek Abbott,et al. PUF Sensor: Exploiting PUF Unreliability for Secure Wireless Sensing , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.
[6] Azzam Sleit,et al. Authentication Techniques for the Internet of Things: A Survey , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).
[7] Sherali Zeadally,et al. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.
[8] Altair Olivo Santin,et al. An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT , 2014, GLOBECOM 2014.
[9] Jemal H. Abawajy,et al. A Multi-protocol Security Framework to Support Internet of Things , 2016, SecureComm.
[10] Ronggao Zhang. An enhanced lightweight authentication protocol for low-cost RFID systems , 2016, 2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT).
[11] Patrick Schaumont,et al. Compact and low-power ASIP design for lightweight PUF-based authentication protocols , 2016, IET Inf. Secur..
[12] Jonghyun Baek,et al. Secure and Lightweight Authentication Protocol for NFC Tag Based Services , 2015, 2015 10th Asia Joint Conference on Information Security.
[13] Hossein Gharaee,et al. Lightweight, anonymous and mutual authentication in IoT infrastructure , 2016, 2016 8th International Symposium on Telecommunications (IST).
[14] Prosanta Gope,et al. A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.
[15] Woody Sherman,et al. Improved Docking of Polypeptides with Glide , 2013, J. Chem. Inf. Model..
[16] Walid Saad,et al. On the authentication of devices in the Internet of things , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[17] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[18] Jiyong Han. Chaining the secret: Lightweight authentication for security in pervasive computing , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[19] Srinivas Sampalli,et al. Lightweight protocol for anonymity and mutual authentication in RFID systems , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[20] Jemal H. Abawajy,et al. Secure Object Tracking Protocol for the Internet of Things , 2016, IEEE Internet of Things Journal.
[21] Jonathan Margulies. Garage Door Openers: An Internet of Things Case Study , 2015, IEEE Security & Privacy.
[22] Bilhanan Silverajan,et al. Collaborative cloud-based management of home networks , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[23] Jian Shen,et al. A Lightweight Mutual Authentication Scheme for User and Server in Cloud , 2015, 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA).
[24] Dave Parry,et al. A lightweight authentication scheme for transport system farecards , 2016, 2016 IEEE International Conference on RFID Technology and Applications (RFID-TA).
[25] Nan Zhang,et al. A lightweight authentication and authorization solution based on Kerberos , 2016, 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).
[26] Djamel Tandjaoui,et al. A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things , 2016, 2016 Wireless Telecommunications Symposium (WTS).
[27] T. Tantidham,et al. HIVE: Home Automation System for Intrusion Detection , 2016, 2016 Fifth ICT International Student Project Conference (ICT-ISPC).
[28] Jen-Ho Yang,et al. An ID-Based User Authentication Scheme for Cloud Computing , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[29] Chen Shen,et al. Low-complexity Scalable Authentication algorithm with Imperfect Shared Keys for Internet of Things , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[30] Jemal H. Abawajy,et al. Universal and secure object ownership transfer protocol for the Internet of Things , 2018, Future Gener. Comput. Syst..
[31] Weidong Yang,et al. A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks , 2014, GLOBECOM 2014.
[32] Prosanta Gope,et al. Lightweight and Energy-Efficient Mutual Authentication and Key Agreement Scheme With User Anonymity for Secure Communication in Global Mobility Networks , 2016, IEEE Systems Journal.
[33] Sayidul Morsalin,et al. Machine-to-machine communication based smart home security system by NFC, fingerprint, and PIR sensor with mobile android application , 2016, 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT).
[34] Srinivas Devadas,et al. A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication , 2016, IEEE Transactions on Multi-Scale Computing Systems.
[35] Chuck Yoo,et al. DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).
[36] Xuemin Shen,et al. Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections , 2017, IEEE Transactions on Vehicular Technology.
[37] Rune Hylsberg Jacobsen,et al. Towards the Use of Pairing-Based Cryptography for Resource-Constrained Home Area Networks , 2015, 2015 Euromicro Conference on Digital System Design.
[38] Gerhard P. Hancke,et al. Smartphone: The key to your connected smart home , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).
[39] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[40] Gang Qu,et al. VOLtA: Voltage over-scaling based lightweight authentication for IoT applications , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[41] Xiaolin Xu,et al. LADP: A lightweight authentication and delegation protocol for RFID tags , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.
[42] Yang Liu,et al. Leveraging carbon nanotube technologies in developing Physically Unclonable Function for cyber-physical system authentication , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[43] Tadayoshi Kohno,et al. Computer security and the modern home , 2013, CACM.
[44] Djamal Zeghlache,et al. Lightweight collaborative key establishment scheme for the Internet of Things , 2014, Comput. Networks.
[45] Andrei Gurtov,et al. Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.
[46] Hamid Mala,et al. A new lightweight authentication and key agreement protocol for Internet of Things , 2016, 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[47] Panchami V,et al. BISC authentication algorithm: An efficient new authentication algorithm using three factor authentication for mobile banking , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).
[48] Li-Chun Wang,et al. Lightweight Authentication Mechanism for Software Defined Network Using Information Hiding , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[49] Ragib Hasan,et al. HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things , 2017, 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).
[50] Jheng-Jia Huang,et al. Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments , 2016, MobiQuitous.
[51] Muhammad Khurram Khan,et al. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.
[52] Liehuang Zhu,et al. 2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.