Internet of things' authentication and access control
暂无分享,去创建一个
[1] Xuemin Shen,et al. A self-encryption authentication protocol for teleconference services , 2006, Int. J. Secur. Networks.
[2] Yiming Wang,et al. Error analysis of range-based localisation algorithms in wireless sensor networks , 2012, Int. J. Sens. Networks.
[3] Amardeo Sarma,et al. Identities in the Future Internet of Things , 2009, Wirel. Pers. Commun..
[4] Myung J. Lee,et al. A lightweight encryption and authentication scheme for wireless sensor networks , 2006, Int. J. Secur. Networks.
[5] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[6] Rajeev Tripathi,et al. Optimal number of clusters in wireless sensor networks: An FCM approach , 2010 .
[7] Shouling Ji,et al. Data caching-based query processing in multi-sink wireless sensor networks , 2012, Int. J. Sens. Networks.
[8] Ma Jian-feng,et al. An Access Control Scheme in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[9] Nahid Shahmehri,et al. 2-clickAuth Optical Challenge-Response Authentication , 2010, 2010 International Conference on Availability, Reliability and Security.
[10] Wei Wang,et al. Constructing minimum interference connected dominating set for multi-channel multi-radio multi-hop wireless network , 2012, Int. J. Sens. Networks.
[11] Sven Laur,et al. User-aided data authentication , 2009, Int. J. Secur. Networks.
[12] Li Liu,et al. A Virtual Password Scheme to Protect Passwords , 2008, 2008 IEEE International Conference on Communications.
[13] Mohamed F. Younis,et al. Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks , 2012, Int. J. Sens. Networks.
[14] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[15] Abdelsalam Helal,et al. Optimal and distributed algorithms for coverage hole healing in hybrid sensor networks , 2012, Int. J. Sens. Networks.
[16] Xiaojiang Du,et al. Weaving a proper net to catch large objects in wireless sensor networks , 2010, IEEE Transactions on Wireless Communications.
[17] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[18] Naixue Xiong,et al. Distributed k-connected fault-tolerant topology control algorithms with PSO in future autonomic sensor systems , 2012, Int. J. Sens. Networks.
[19] Bo Sheng,et al. Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[20] Yang Xiao,et al. A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID , 2011, Wirel. Commun. Mob. Comput..
[21] Yang Xiao,et al. A Lightweight Secure Solution for RFID. , 2006 .
[22] Daisuke Takahashi,et al. Wireless telemedicine and m-health: technologies, applications and research issues , 2011, Int. J. Sens. Networks.
[23] Yi Pan,et al. Load-balanced CDS construction in wireless sensor networks via genetic algorithm , 2012, Int. J. Sens. Networks.
[24] Bo Chen,et al. A high computational power wireless sensor network for distributed structural health monitoring , 2012, Int. J. Sens. Networks.
[25] Bodo Möller,et al. Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol , 2007, Int. J. Secur. Networks.
[26] Victor C. M. Leung,et al. Improved IP Multimedia Subsystem Authentication mechanism for 3G-WLAN networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[27] Eyal de Lara,et al. Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.
[28] Hui-Feng Huang,et al. A novel access control protocol for secure sensor networks , 2009, Comput. Stand. Interfaces.
[29] Qun Li,et al. Distributed User Access Control in Sensor Networks , 2006, DCOSS.
[30] Rolf H. Weber,et al. Internet of things - Need for a new legal environment? , 2009, Comput. Law Secur. Rev..
[31] Fei Hu,et al. Towards a Secure, RFID / Sensor Based Telecardiology System , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[32] Sunghyun Choi,et al. Two-level protection and guarantee for multimedia traffic in IEEE 802.11e distributed WLANs , 2009, Wirel. Networks.
[33] Manikanden Balakrishnan,et al. Preemptive emergency medium access for wireless sensor networks: performance under realistic network conditions , 2012, Int. J. Sens. Networks.
[34] Young H. Cho,et al. Water temperature sensing with microtomography , 2012, Int. J. Sens. Networks.
[35] Yang Xiao,et al. Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft , 2014, IEEE Systems Journal.
[36] Yang Xiao,et al. Secret Little Functions and Codebook for Protecting Users from Password Theft , 2008, 2008 IEEE International Conference on Communications.
[37] Yang Xiao,et al. Studying the stochastic capturing of moving intruders by mobile sensors , 2012, Comput. Math. Appl..
[38] Wang Huan,et al. Studying on internet of things based on fingerprint identification , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[39] Yu-Chee Tseng,et al. Exploiting spatial correlation at the link layer for event-driven sensor networks , 2012, Int. J. Sens. Networks.
[40] Zinaida Benenson,et al. An algorithmic framework for robust access control in wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[41] Bo Li,et al. Dynamic Bandwidth Partition with Finer-Tune (DP-FT) Scheme for Multimedia IEEE 802.11e WLANs , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[42] Jie Wu,et al. Impacts of sensor node distributions on coverage in sensor networks , 2011, J. Parallel Distributed Comput..
[43] Tai-Myung Chung,et al. Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure , 2011, IEEE Transactions on Vehicular Technology.
[44] Tassos Dimitriou,et al. Scatter - secure code authentication for efficient reprogramming in wireless sensor networks , 2011, Int. J. Sens. Networks.
[45] Guoliang Xue,et al. Authenticating strangers in Online Social Networks , 2011, Int. J. Secur. Networks.
[46] Ju Wang,et al. A cross-layer authentication design for secure video transportation in wireless sensor network , 2010, Int. J. Secur. Networks.
[47] Ming-Hour Yang,et al. Lightweight authentication protocol for mobile RFID networks , 2010, Int. J. Secur. Networks.
[48] R. C. Hansdah,et al. A Weighted Average Based External Clock Synchronization Protocol for Wireless Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[49] Jong-Wook Han,et al. Intelligent Pervasive Network Authentication: S/Key Based Device Authentication , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.
[50] Xuemin Shen,et al. Energy-efficient transmission and bit allocation schemes in wireless sensor networks , 2012, Int. J. Sens. Networks.
[51] Ahmed Helmy,et al. Gauging human mobility characteristics and its impact on mobile routing performance , 2012, Int. J. Sens. Networks.
[52] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[53] Yang Xiao,et al. Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[54] Dominik Henrich,et al. Optimal camera placement to measure distances regarding static and dynamic obstacles , 2012, Int. J. Sens. Networks.
[55] Yang Xiao,et al. Performance analysis of ALOHA and p-persistent ALOHA for multi-hop underwater acoustic sensor networks , 2011, Cluster Computing.
[56] Yuguang Fang,et al. Access control in wireless sensor networks , 2007, Ad Hoc Networks.
[57] Yang Xiao,et al. Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags , 2011, Wirel. Commun. Mob. Comput..
[58] Wei-Tek Tsai,et al. Role-Based Access-Control Using Reference Ontology in Clouds , 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems.
[59] Yang Xiao,et al. MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[60] Moustafa Youssef,et al. A source authentication scheme using network coding , 2011, Int. J. Secur. Networks.
[61] Yang Xiao,et al. Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access , 2004, IEEE Transactions on Parallel and Distributed Systems.
[62] Rachid Beghdad. Efficient coverage protocol without location information , 2012, Int. J. Sens. Networks.
[63] D. K. Lobiyal,et al. An energy-efficient adaptive clustering algorithm with load balancing for wireless sensor network , 2012, Int. J. Sens. Networks.
[64] Salah A. Aly. Distributed data collection and storage algorithms for collaborative learning vision sensor devices with applications to pilgrimage , 2012, Int. J. Sens. Networks.
[65] Christian Callegari,et al. Detecting anomalies in backbone network traffic: a performance comparison among several change detection methods , 2012, Int. J. Sens. Networks.
[66] Li Wern Chew,et al. Low memory image stitching and compression for WMSN using strip-based processing , 2012, Int. J. Sens. Networks.
[67] Won-Tae Kim,et al. Many-to-one communication protocol for wireless sensor networks , 2012, Int. J. Sens. Networks.
[68] Bo Li,et al. Bandwidth Sharing Schemes for Multimedia Traffic in the IEEE 802.11e Contention-Based WLANs , 2007, IEEE Transactions on Mobile Computing.
[69] Guihai Chen,et al. Efficient median estimation for large-scale sensor RFID systems , 2012, Int. J. Sens. Networks.
[70] Xueyan Tang,et al. An efficient data collection scheme through multi-path routing structures in wireless sensor networks , 2012, Int. J. Sens. Networks.
[71] Li-Minn Ang,et al. Low-memory video compression architecture using strip-based processing for implementation in wireless multimedia sensor networks , 2012, Int. J. Sens. Networks.
[72] Gang Liu,et al. Cooperative relay assignment for static energy-constrained networks , 2012, Int. J. Sens. Networks.
[73] Krishna M. Sivalingam,et al. An efficient One-Time Password authentication scheme using a smart card , 2009, Int. J. Secur. Networks.
[74] Ying Zhang,et al. Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks , 2010, IEEE Transactions on Computers.
[75] David Grau,et al. Automatically tracking engineered components through shipping and receiving processes with passive identification technologies , 2012 .
[76] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[77] Huaxiong Wang,et al. Efficient multicast stream authentication for the fully adversarial network model , 2007, Int. J. Secur. Networks.
[78] Yang Xiao. QoS guarantee and provisioning at the contention-based wireless MAC layer in the IEEE 802.11e wireless LANs , 2006, IEEE Wirel. Commun..
[79] Yang Xiao,et al. Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..
[80] Shiuh-Pyng Shieh,et al. Authentication and secret search mechanisms for RFID-aware wireless sensor networks , 2010, Int. J. Secur. Networks.
[81] Yang Xiao. IEEE 802.11e: QoS provisioning at the MAC layer , 2004, IEEE Wirel. Commun..
[82] Yang Xiao,et al. Radio frequency identification: technologies, applications, and research issues , 2007, Wirel. Commun. Mob. Comput..
[83] Yang Xiao,et al. The effect of leaders on the consistency of group behaviour , 2012, Int. J. Sens. Networks.
[84] Xiaohui Liang,et al. ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.
[85] Ali Movaghar-Rahimabadi,et al. Anonymous authentication protocol for GSM networks , 2008, Int. J. Secur. Networks.
[86] Yang Xiao,et al. Bio-inspired communications among robots, sensors, and RFID tags , 2009, 2009 International Conference on Mechatronics and Automation.
[87] Toufik Ahmed,et al. Streaming multimedia over WMSNs: an online multipath routing protocol , 2012, Int. J. Sens. Networks.
[88] Hsiao-Hwa Chen,et al. DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.
[89] Kee-Young Yoo,et al. Efficient and Secure Password Authentication Schemes for Low-Power Devices , 2005, MSN.
[90] CongDuc Pham. Coverage and activity management of wireless video sensor networks for surveillance applications , 2012, Int. J. Sens. Networks.
[91] Yang Xiao,et al. Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[92] Fei Hu,et al. Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009 .
[93] Xiong Li,et al. Research on the Architecture of Trusted Security System Based on the Internet of Things , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.
[94] Yang Xiao,et al. Analysis of energy consumption for multiple object identification system with active RFID tags , 2008 .
[95] Xiaojiang Du,et al. Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks , 2009, Comput. Networks.
[96] Sumit Kundu,et al. Optimal transmit power and packet size in wireless sensor networks in lognormal shadowed environment , 2012, Int. J. Sens. Networks.
[97] Mohammed G. H. al Zamil,et al. Dispersion-based prediction framework for estimating missing values in wireless sensor networks , 2012, Int. J. Sens. Networks.
[98] William Stallings,et al. Cryptography and network security , 1998 .
[99] Hrishikesh B. Acharya,et al. Is That You? Authentication in a Network without Identities , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[100] Joos Vandewalle,et al. Overview of authentication protocols , 1997, Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology.
[101] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[102] Meng Wu,et al. Research on security management for Internet of Things , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[103] Weili Wu,et al. A constant-factor approximation for d-hop connected dominating sets in unit disk graph , 2012, Int. J. Sens. Networks.
[104] Jorge Sá Silva,et al. Mobile multimedia in wireless sensor networks , 2012, Int. J. Sens. Networks.
[105] Deying Li,et al. An approximation algorithm for dominating nodes selection in multi-channel multi-radio wireless sensor networks , 2012, Int. J. Sens. Networks.