Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review
暂无分享,去创建一个
[1] P. Balamuralidhar,et al. Secure MQTT for Internet of Things (IoT) , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[2] Matthias Mettler,et al. Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[3] Utz Roedig,et al. Demo abstract: Securing communication in 6LoWPAN with compressed IPsec , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).
[4] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[5] Victor I. Chang,et al. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..
[6] Biplab Sikdar,et al. Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices , 2019, IEEE Internet of Things Journal.
[7] Klaus Wehrle,et al. A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin , 2018, Financial Cryptography.
[8] Andrei V. Gurtov,et al. PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.
[9] Prasad Calyam,et al. End-to-End IoT Security Middleware for Cloud-Fog Communication , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[10] Biplab Sikdar,et al. A Light-Weight Mutual Authentication Protocol for IoT Systems , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[11] Arshdeep Bahga,et al. Blockchain Platform for Industrial Internet of Things , 2016 .
[12] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[13] Nallapaneni Manoj Kumar,et al. Blockchain technology for security issues and challenges in IoT , 2018 .
[14] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[15] Eui-nam Huh,et al. Fog Computing and Smart Gateway Based Communication for Cloud of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[16] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[17] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[18] Cong Pu,et al. Mitigating Forwarding misbehaviors in RPL-based low power and lossy networks , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[19] Farookh Khadeer Hussain,et al. A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT) , 2017, BWCCA.
[20] Elisa Bertino,et al. Robust Multi-Factor Authentication for Fragile Communications , 2014, IEEE Transactions on Dependable and Secure Computing.
[21] Georg Carle,et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[22] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[23] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[24] Victor I. Chang,et al. From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions , 2017, Algorithms.
[25] Yuguang Fang,et al. EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis , 2018, IEEE Internet of Things Journal.
[26] Ahmet M. Kondoz,et al. Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption , 2017, 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[27] Rongxing Lu,et al. From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.
[28] Maged Hamada Ibrahim,et al. Octopus: An Edge-fog Mutual Authentication Scheme , 2016, Int. J. Netw. Secur..
[29] Steven L. Kinney. Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) , 2006 .
[30] Abdellah Ait Ouahman,et al. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT , 2017 .
[31] Thiemo Voigt,et al. 6LoWPAN Compressed DTLS for CoAP , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.
[32] Panagiotis Papadimitratos,et al. SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things , 2017, Future Gener. Comput. Syst..
[33] Mohamed Abid,et al. A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment , 2017, 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA).
[34] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[35] Namje Park,et al. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle , 2015, Sensors.
[36] Qusay H. Mahmoud,et al. An efficient and secure scheme for smart home communication using identity-based signcryption , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).
[37] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[38] Roy H. Campbell,et al. World of Empowered IoT Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[39] Klaus Wehrle,et al. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[40] Simon Parkinson,et al. Fog computing security: a review of current applications and security solutions , 2017, Journal of Cloud Computing.
[41] Ralph Deters,et al. Blockchain as a Service for IoT , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[42] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[43] Fernando Boavida,et al. Why is IPSec a viable option for wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[44] Marimuthu Palaniswami,et al. WAKE: Key management scheme for wide-area measurement systems in smart grid , 2013, IEEE Communications Magazine.
[45] Bo Yang,et al. Efficient naming, addressing and profile services in Internet-of-Things sensory environments , 2014, Ad Hoc Networks.
[46] HuWen,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, ADHOCNETS 2013.
[47] Diego López-de-Ipiña,et al. Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications , 2014, Comput. Hum. Behav..
[48] Maurizio A. Spirito,et al. The VIRTUS Middleware: An XMPP Based Architecture for Secure IoT Communications , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[49] Johan Pouwelse,et al. TrustChain: A Sybil-resistant scalable blockchain , 2017, Future Gener. Comput. Syst..
[50] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[51] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[52] Youngseop Kim,et al. An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system , 2016, 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).
[53] Shahriar Mirabbasi,et al. Wireless Energy Harvesting for Internet of Things , 2014 .
[54] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[55] Ingo Friese,et al. Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[56] Ujjwal Guin,et al. A Secure Low-Cost Edge Device Authentication Scheme for the Internet of Things , 2018, 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID).
[57] Jorge Sá Silva,et al. Network‐layer security for the Internet of Things using TinyOS and BLIP , 2014, Int. J. Commun. Syst..
[58] Jorge Sá Silva,et al. End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication , 2013, 2013 IFIP Networking Conference.
[59] Xavier Masip-Bruin,et al. Do we all really know what a fog node is? Current trends towards an open definition , 2017, Comput. Commun..
[60] Antonio F. Gómez-Skarmeta,et al. SMARTIE project: Secure IoT data management for smart cities , 2015, 2015 International Conference on Recent Advances in Internet of Things (RIoT).
[61] Abderrezak Rachedi,et al. A Secure Routing Protocol Based on RPL for Internet of Things , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[62] Syed Rameem Zahra,et al. Assesing the Services, Security Threaths, Challenges and Solutions in the Internet of Things , 2019, Scalable Comput. Pract. Exp..
[63] Xiaohui Liang,et al. GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.
[64] Qinglan Zhao,et al. Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power , 2018, IEEE Access.
[65] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[66] Madhusudan Singh,et al. Blockchain: A game changer for securing IoT data , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
[67] Utz Roedig,et al. Securing Internet of Things with Lightweight IPsec , 2010 .
[68] Pál Varga,et al. Security threats and issues in automation IoT , 2017, 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS).
[69] Tie Qiu,et al. Survey on fog computing: architecture, key technologies, applications and open issues , 2017, J. Netw. Comput. Appl..
[70] Keke Gai,et al. Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things , 2018, IEEE Internet of Things Journal.
[71] Michele Nogueira Lima,et al. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).
[72] Nabil Rifi,et al. Towards using blockchain technology for IoT data access protection , 2017, 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB).
[73] Michele Zorzi. An End-to-End Security Framework for the Internet of Things , 2015 .
[74] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[75] Jorge Sá Silva,et al. Enabling Network-Layer Security on IPv6 Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[76] Sushmita Ruj,et al. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT , 2020, J. Netw. Comput. Appl..
[77] Xin Huang,et al. A Secure System For Pervasive Social Network-Based Healthcare , 2016, IEEE Access.
[78] Sushmita Ruj,et al. End to end secure anonymous communication for secure directed diffusion in IoT , 2019, ICDCN.
[79] Y. Kim,et al. Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications , 2017, CISRC.
[80] D. Bastos,et al. Internet of Things: A survey of technologies and security risks in smart home and city environments , 2018, IoT 2018.
[81] Michele Zorzi,et al. BlinkToSCoAP: An end-to-end security framework for the Internet of Things , 2015, 2015 7th International Conference on Communication Systems and Networks (COMSNETS).
[82] Antônio Augusto Fröhlich,et al. IoT Data Integrity Verification for Cyber-Physical Systems Using Blockchain , 2018, 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC).