A Novel Secure Authentication Scheme for Heterogeneous Internet of Things
暂无分享,去创建一个
[1] Yi Luo,et al. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT , 2018, Secur. Commun. Networks.
[2] Li Yong. Key establishment and authentication scheme for heterogeneous integrated network based on CPK , 2009 .
[3] Xiaojiang Du,et al. Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet , 2007, IEEE Communications Magazine.
[4] Artemis Moroni,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[5] Wenhao Wang,et al. A Replay-Attack Resistant Authentication Scheme for the Internet of Things , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[6] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[7] Kaizhi Huang,et al. CPK and ECC-Based Authentication and Key Agreement Scheme for Heterogeneous Wireless Network , 2008, 2008 International Conference on Computer Science and Software Engineering.
[8] S. B. Thorat,et al. Lightweight Anonymity-Preserving Authentication and Key Agreement Protocol for the Internet of Things Environment , 2017 .
[9] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[10] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[11] Saru Kumari,et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.
[12] Xiaojiang Du,et al. QoS routing based on multi-class nodes for mobile ad hoc networks , 2004, Ad Hoc Networks.
[13] Chao Liu,et al. An authenticated key agreement protocol for cross-domain based on heterogeneous signcryption scheme , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[14] Anthony Mackitz Dzisoo,et al. Heterogeneous Identity-based to certificate less online/offline signcryption , 2015 .
[15] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[16] Hamid Mala,et al. A new lightweight authentication and key agreement protocol for Internet of Things , 2016, 2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC).
[17] Ping Wang,et al. Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity , 2015, Inf. Sci..
[18] Xiong Li,et al. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security , 2017, J. Ambient Intell. Humaniz. Comput..
[19] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[20] Xiaojiang Du,et al. Designing efficient routing protocol for heterogeneous sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[21] Yong Xu,et al. Hybrid key management scheme for preventing man-in-middle attack in heterogeneous sensor networks , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).
[22] Li Li,et al. A provably secure password-based anonymous authentication scheme for wireless body area networks , 2017, Comput. Electr. Eng..
[23] Fei Dai,et al. Load Balance and Energy Efficient Data Gathering in Wireless Sensor Networks , 2006, MASS.
[24] Mohsen Guizani,et al. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.
[25] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[26] Robert Green,et al. Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network , 2015, SpringSim.
[27] Runtong Zhang,et al. An Improved Identity Authentication Scheme for Internet of Things in Heterogeneous Networking Environments , 2013, 2013 16th International Conference on Network-Based Information Systems.
[28] Xiaojiang Du,et al. Adaptive cell relay routing protocol for mobile ad hoc networks , 2006, IEEE Transactions on Vehicular Technology.
[29] Magdy A. Bayoumi,et al. A Novel Authentication and Key Agreement Protocol for Internet of Things Based Resource-Constrained Body Area Sensors , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).
[30] Chandra Sekhar Vorugunti,et al. A Secure Biometric-Based User Authentication Scheme for Heterogeneous WSN , 2014, 2014 Fourth International Conference of Emerging Applications of Information Technology.
[31] Mohsen Guizani,et al. Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[32] Zahid Mahmood,et al. Lightweight Two-Level Session Key Management for End User Authentication in Internet of Things , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[33] Myung-Hwan Kim,et al. An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard , 2012, ICISC.