BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
暂无分享,去创建一个
V. N. Sastry | Manojkumar Vivekanandan | Sastry V. N. | Srinivasulu Reddy U. | M. Vivekanandan | U. S. Reddy | Sastry V. N. | S. U.
[1] Mohamed Amine Ferrag,et al. Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.
[2] Lu Zhou,et al. Lightweight IoT-based authentication scheme in cloud computing circumstance , 2019, Future Gener. Comput. Syst..
[3] V. N. Sastry,et al. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things , 2017, Inf..
[4] Samiran Chattopadhyay,et al. Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications , 2019, IEEE Transactions on Industrial Informatics.
[5] Ashok Kumar Das,et al. Certificate-Based Anonymous Device Access Control Scheme for IoT Environment , 2019, IEEE Internet of Things Journal.
[6] Mauro Conti,et al. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.
[7] Joel J. P. C. Rodrigues,et al. LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment , 2019, Sensors.
[8] Arup Kumar Pal,et al. An efficient three factor-based authentication scheme in multiserver environment using ECC , 2018, Int. J. Commun. Syst..
[9] B. B. Gupta,et al. A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices , 2017, Int. J. Adv. Intell. Paradigms.
[10] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[11] Alireza Naghizadeh,et al. Preserving receiver's anonymity for circular structured P2P networks , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[12] F. Richard Yu,et al. A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.
[13] Rajni Gupta,et al. Resource Provisioning and Scheduling Techniques of IoT Based Applications in Fog Computing , 2019, Int. J. Fog Comput..
[14] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[15] Kostas E. Psannis,et al. Advanced Media-Based Smart Big Data on Intelligent Cloud Systems , 2019, IEEE Transactions on Sustainable Computing.
[16] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[17] Alireza Naghizadeh,et al. Structural‐based tunneling: preserving mutual anonymity for circular P2P networks , 2016, Int. J. Commun. Syst..
[18] Biplab Sikdar,et al. Mutual Authentication in IoT Systems Using Physical Unclonable Functions , 2017, IEEE Internet of Things Journal.
[19] Brij B. Gupta,et al. Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT , 2018, Sustain. Comput. Informatics Syst..
[20] Biplab Sikdar,et al. BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments , 2018, BlockSys@SenSys.
[21] Daya Gupta,et al. NFC Secure Element-Based Mutual Authentication and Attestation for IoT Access , 2018, IEEE Transactions on Consumer Electronics.
[22] Hui Li,et al. A Survey on Security Aspects for 3GPP 5G Networks , 2020, IEEE Communications Surveys & Tutorials.
[23] Ashok Kumar Das,et al. Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things , 2020, IEEE Transactions on Dependable and Secure Computing.
[24] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[25] Mohammad S. Obaidat,et al. An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks , 2020, IEEE Access.
[26] Mirza Mohd. Sufyan Beg,et al. Using Vehicles as Fog Infrastructures for Transportation Cyber-Physical Systems (T-CPS): Fog Computing for Vehicular Networks , 2019, Int. J. Softw. Sci. Comput. Intell..
[27] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[28] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[29] NaghizadehA.,et al. Structural-based tunneling , 2016 .
[30] Lianbing Deng,et al. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications , 2019, Inf. Sci..
[31] Ahmed Jawad Kadhim,et al. Energy-efficient multicast routing protocol based on SDN and fog computing for vehicular networks , 2019, Ad Hoc Networks.
[32] Qingyi Zhu,et al. Applications of Distributed Ledger Technologies to the Internet of Things , 2019, ACM Comput. Surv..
[33] Brij B. Gupta,et al. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..
[34] Reza Ebrahimi Atani,et al. An Incentive Security Model to Provide Fairness for Peer-to-Peer Networks , 2019, 2019 IEEE Conference on Application, Information and Network Security (AINS).
[35] Dongxi Liu,et al. Lightweight Mutual Authentication for IoT and Its Applications , 2017, IEEE Transactions on Sustainable Computing.
[36] Sanjay P. Ahuja,et al. Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications , 2020, Int. J. Cloud Appl. Comput..
[37] Yaser Jararweh,et al. A multi-attack resilient lightweight IoT authentication scheme , 2019, Trans. Emerg. Telecommun. Technol..
[38] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[39] Joel J. P. C. Rodrigues,et al. Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment , 2019, IEEE Access.
[40] Rui Zhang,et al. Security and Privacy on Blockchain , 2019, ACM Comput. Surv..
[41] Ben Smyth,et al. ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial , 2011 .
[42] Mauro Conti,et al. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..