Multilevel authentication protocol for enabling secure communication in Internet of Things
暂无分享,去创建一个
[1] Andrei V. Gurtov,et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[2] Guangxia Xu,et al. SDN-Based Data Transfer Security for Internet of Things , 2018, IEEE Internet of Things Journal.
[3] Fei Song,et al. A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios , 2018, Sensors.
[4] Jianfeng Chu,et al. A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment , 2020, Symmetry.
[5] Ahthasham Sajid,et al. A Secure Communication in IoT Enabled Underwater and Wireless Sensor Network for Smart Cities , 2020, Sensors.
[6] Yousaf Bin Zikria,et al. A secure and lightweight authentication scheme for next generation IoT infrastructure , 2021, Comput. Commun..
[7] Chao Li,et al. A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment , 2020, IEEE Access.
[8] Sumit Kumar,et al. Internet of Vehicles over Vanets: Smart and Secure Communication using IoT , 2020, Scalable Comput. Pract. Exp..
[9] Sudeep Tanwar,et al. Secure data dissemination techniques for IoT applications: Research challenges and opportunities , 2020, Softw. Pract. Exp..
[10] Ruhul Amin,et al. Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks , 2017, Multimedia Tools and Applications.
[11] Mohsen Guizani,et al. StabTrust—A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks , 2020, IEEE Access.
[12] Saru Kumari,et al. Practical Identity Based Online/Off-Line Signcryption Scheme for Secure Communication in Internet of Things , 2021, IEEE Access.
[13] Jingcheng Wang,et al. An improved mutual authentication and key update scheme for Multi-Hop Relay in internet of things , 2012, 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).
[14] Sherali Zeadally,et al. Securing Internet of Things with Software Defined Networking , 2018, IEEE Communications Magazine.
[15] Moayad Aloqaily,et al. An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.
[16] M. Barbari,et al. Correlation between egg quality parameters, housing thermal conditions and age of laying hens , 2017 .
[17] Fan Wu,et al. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[18] Laurence T. Yang,et al. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.
[19] Jinzhao Lin,et al. NoSQL: Confidential on Data Security and Data Management by Using a Mobile Application , 2016 .
[20] Sheetal Kalra,et al. Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..
[21] Mohammad Ayoub Khan,et al. A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data , 2020, IEEE Access.
[22] YoHan Park,et al. Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments , 2019, Sensors.
[23] Jingsha He,et al. LA-Based Approach for IoT Security , 2017, J. Robotics Netw. Artif. Life.
[24] Abderrezak Rachedi,et al. A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology , 2016, Comput. Commun..
[25] S. ChithraR. Enhanced WOA and Modular Neural Network for Severity Analysis of Tuberculosis , 2019, Multimedia Research.
[26] Jinzhao Lin,et al. NoSQL Injection: Data Security on Web Vulnerability , 2016 .
[27] Jong Hyuk Park,et al. Secure D2D Communication for 5G IoT Network Based on Lightweight Cryptography , 2019, Applied Sciences.
[28] Masoumeh Safkhani,et al. ECCbAP: A secure ECC-based authentication protocol for IoT edge devices , 2020, Pervasive Mob. Comput..
[29] Wuxiong Zhang,et al. Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey , 2020, Wirel. Commun. Mob. Comput..
[30] Limengnan Zhou,et al. A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication , 2021, IEEE Access.
[31] Jongsung Kim,et al. A secure ECC-based RFID mutual authentication protocol for internet of things , 2016, The Journal of Supercomputing.
[32] Biplab Sikdar,et al. Mutual Authentication in IoT Systems Using Physical Unclonable Functions , 2017, IEEE Internet of Things Journal.
[33] P. Mohamed Shakeel,et al. A decentralized scalable security framework for end‐to‐end authentication of future IoT communication , 2019, Trans. Emerg. Telecommun. Technol..
[34] Zhiwei Wang,et al. A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity , 2017, Future Gener. Comput. Syst..
[35] A. Gopi,et al. Secure Communication in Internet of Things , 2017 .
[36] Fadi Al-Turjman,et al. A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems , 2020, IEEE Access.
[37] Hemn B. Abdalla,et al. Optimization Driven MapReduce Framework for Indexing and Retrieval of Big Data , 2020, KSII Trans. Internet Inf. Syst..
[38] Ioannis Papaefstathiou,et al. SCOTRES: Secure Routing for IoT and CPS , 2017, IEEE Internet of Things Journal.
[39] Victor I. Chang,et al. A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment , 2018, Future Gener. Comput. Syst..
[40] Hakim Allali,et al. Towards a New Model to Secure IoT-based Smart Home Mobile Agents using Blockchain Technology , 2020 .
[41] Saru Kumari,et al. A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things , 2019, Int. J. Commun. Syst..
[42] Ram Mohan Chintalapalli,et al. Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization , 2019, Int. J. Model. Simul. Sci. Comput..
[43] Mauro Conti,et al. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.
[44] Antonella Molinaro,et al. From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols , 2011, IEEE Communications Surveys & Tutorials.
[45] Rajesh S. Prasad,et al. Multi-objective fractional gravitational search algorithm for energy efficient routing in IoT , 2019, Wirel. Networks.
[46] Daniel Díaz Sánchez,et al. Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies , 2017, Future Gener. Comput. Syst..
[47] Ilda de Fátima Ferreira Tinôco,et al. Evaluation of the surface temperature of laying hens in different thermal environments during the initial stage of age based on thermographic images. , 2017 .
[48] Tanweer Alam. Efficient and Secure Data Transmission Approach in Cloud-MANET-IoT Integrated Framework , 2020 .
[49] Jong Hyuk Park,et al. A deep learning-based IoT-oriented infrastructure for secure smart City , 2020 .
[50] Sayan Kumar Ray,et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..
[51] Charalampos Manifavas,et al. Building Trust in Ad Hoc Distributed Resource-Sharing Networks Using Reputation-Based Systems , 2012, 2012 16th Panhellenic Conference on Informatics.
[52] G. P. Biswas,et al. A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography , 2020, The Journal of Supercomputing.
[53] Andrei V. Gurtov,et al. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.
[54] Xiaoyong Li,et al. A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion , 2018, IEEE Access.