New enhanced authentication protocol for Internet of Things
暂无分享,去创建一个
Mourade Azrour | Yousef Farhaoui | Jamal Mabrouki | Azedine Guezzaz | J. Mabrouki | Mourade Azrour | Yousef Farhaoui | Azidine Guezzaz
[1] Ya-Fen Chang,et al. Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments , 2019, Int. J. Netw. Secur..
[2] Anass Sedrati,et al. A Survey of Security Challenges in Internet of Things , 2018 .
[3] Nipun Bansal,et al. Peer to Peer Networking and Applications , 2013 .
[4] Mohammad Reza Aref,et al. Cryptanalysis and Improvement of a User Authentication Scheme for Internet of Things Using Elliptic Curve Cryptography , 2019, Int. J. Netw. Secur..
[5] Ru-chuan Wang,et al. An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .
[6] Jong Hyuk Park,et al. An enhanced security framework for home appliances in smart home , 2017, Human-centric Computing and Information Sciences.
[7] Sheetal Kalra,et al. Multi-factor user authentication scheme for IoT-based healthcare services , 2018, Journal of Reliable Intelligent Environments.
[8] Gaurav Tiwari. Hardware/Software Based a Smart Sensor Interface Device for Water Quality Monitoring in IoT Environment , 2015 .
[9] Chin-Chen Chang,et al. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[10] Wei Gao,et al. Satellite remote sensing of aerosol optical depth: advances, challenges, and perspectives , 2019, Critical Reviews in Environmental Science and Technology.
[11] Jenq-Shiou Leu,et al. A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks , 2014, Wirel. Pers. Commun..
[12] Romano Fantacci,et al. A network architecture solution for efficient IOT WSN backhauling: challenges and opportunities , 2014, IEEE Wireless Communications.
[13] Agung Trisetyarso,et al. Proposing Smart Disaster Management in Urban Area , 2019, ACIIDS.
[14] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.
[15] Chunming Rong,et al. Smart Home Security Monitor System , 2016, 2016 15th International Symposium on Parallel and Distributed Computing (ISPDC).
[16] Xiangjian He,et al. A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[17] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[18] Ahmed Fathy,et al. Smart Home Automated Control System Using Android Application and Microcontroller , 2014 .
[19] A. Ijspeert,et al. Environmental monitoring using autonomous vehicles: a survey of recent searching techniques. , 2017, Current Opinion in Biotechnology.
[20] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[21] Yuehong Yin,et al. The internet of things in healthcare: An overview , 2016, J. Ind. Inf. Integr..
[22] Mourade Azrour,et al. Intelligent System for Monitoring and Detecting Water Quality , 2019 .
[23] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[24] Xiong Li,et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
[25] Xiong Li,et al. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..
[26] Debajyoti Mukhopadhyay,et al. Internet of Things Based Weather Forecast Monitoring System , 2018 .
[27] S. I. Samsudin,et al. A Smart Monitoring of a Water Quality Detector System , 2018, Indonesian Journal of Electrical Engineering and Computer Science.
[28] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[29] Geeta Sharma,et al. A secure remote user authentication scheme for smart cities e-governance applications , 2017, Journal of Reliable Intelligent Environments.
[30] Min Wu,et al. An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof , 2017, Int. J. Netw. Secur..
[31] Mohammed Maree,et al. An IoT based monitoring and controlling system for water chlorination treatment , 2018, ICFNDS.
[32] Ashok Kumar Das,et al. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks , 2016, Peer-to-Peer Netw. Appl..
[33] Arif Ur Rahman,et al. Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key , 2019, Int. J. Commun. Syst..
[34] M. Shamim Hossain,et al. Smart healthcare monitoring: a voice pathology detection paradigm for smart cities , 2019, Multimedia Systems.
[35] Rozeha A. Rashid,et al. Smart Home and Ambient Assisted Living Based on the Internet of Things , 2017 .
[36] Kire Trivodaliev,et al. A review of Internet of Things for smart home: Challenges and solutions , 2017 .
[37] Abhishek Kumar,et al. Smart Healthcare Monitoring System , 2018, Wirel. Pers. Commun..
[38] Sheetal Kalra,et al. Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..
[39] Ms. Nidhi Chawla. IOT and Wearable Technology for Smart Healthcare – A Review , 2020 .
[40] N. H. Hassan,et al. The internet of things in healthcare: an overview, challenges and model plan for security risks management process , 2019, Indonesian Journal of Electrical Engineering and Computer Science.
[41] Azidine Guezzaz,et al. Security Analysis of Ye et al. Authentication Protocol for Internet of Things , 2018 .