Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
暂无分享,去创建一个
[1] Ruhul Amin,et al. Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks , 2017, Multimedia Tools and Applications.
[2] Fan Wu,et al. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[3] Mauro Conti,et al. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..
[4] Xiong Li,et al. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..
[5] Deepak Puthal,et al. Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks , 2017, IEEE Consumer Electronics Magazine.
[6] V. P. Arunachalam,et al. Revamp energy efficiency in Homogeneous Wireless Sensor Networks using Optimized Radio Energy Algorithm (OREA) and Power-Aware Distance Source Routing protocol , 2018, Future Gener. Comput. Syst..
[7] Jian Shen,et al. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..
[8] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2017, IEEE Internet of Things Journal.
[9] M. Yuvaraja,et al. Fault detection and recovery scheme for routing and lifetime enhancement in WSN , 2015, Wireless Networks.
[10] Khumanthem Manglem Singh,et al. Implementation of Text Encryption using Elliptic Curve Cryptography , 2015 .
[11] Athanasios V. Vasilakos,et al. An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks , 2017, Comput. Electr. Eng..
[12] Tie Qiu,et al. Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.
[13] Ya-Fen Chang,et al. An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks , 2017, J. Inf. Secur. Appl..
[14] Feng Bao,et al. Evolving privacy: From sensors to the Internet of Things , 2017, Future Gener. Comput. Syst..
[15] Jaswinder Singh,et al. Energy efficient secured routing protocol for MANETs , 2017, Wirel. Networks.
[16] Ashok Kumar Das,et al. A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks , 2017, Wirel. Pers. Commun..
[17] Krishna Kant,et al. LEACH-MAC: a new cluster head selection algorithm for Wireless Sensor Networks , 2015, Wireless Networks.
[18] Zhihua Xia,et al. A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.
[19] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[20] Jun Zhao,et al. Topological Properties of Secure Wireless Sensor Networks Under the $q$ -Composite Key Predistribution Scheme With Unreliable Links , 2017, IEEE/ACM Transactions on Networking.
[21] B. B. Gupta,et al. Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.