Security Challenges in Internet of Things (IoT)
暂无分享,去创建一个
[1] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[2] Bhaskar Mondal,et al. An Improved Cryptography Scheme for Secure Image Communication , 2013 .
[3] Sushil Jajodia,et al. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact , 2014, IEEE Transactions on Information Forensics and Security.
[4] Sana Hoor Jokhio,et al. Light-weight framework for security-sensitive wireless sensor networks applications , 2013, IET Wirel. Sens. Syst..
[5] Carsten Bormann,et al. Terminology for Constrained-Node Networks , 2014, RFC.
[7] Niraj K. Jha,et al. Energy comparison and optimization of wireless body-area network technologies , 2007, BODYNETS.
[8] Jianliang Xu,et al. p-Sensitivity: A Semantic Privacy-Protection Model for Location-based Services , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.
[9] Daojing He,et al. A Novel and Lightweight System to Secure Wireless Medical Sensor Networks , 2014, IEEE Journal of Biomedical and Health Informatics.
[10] Bibhudatta Sahoo,et al. Energy Efficient Heuristic Resource Allocation for Cloud Computing , 2014 .
[11] Hevin Rajesh Dhasian,et al. Survey of data aggregation techniques using soft computing in wireless sensor networks , 2013 .
[12] Jianliang Xu,et al. Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2012, IEEE Transactions on Knowledge and Data Engineering.
[13] Bibhudatta Sahoo,et al. A Genetic Algorithmic approach for Energy Efficient Task Consolidation in Cloud Computing , 2015 .
[14] Alessio Merlo,et al. A survey on energy-aware security mechanisms , 2015, Pervasive Mob. Comput..
[15] Steven Furnell,et al. Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions , 2015, J. Netw. Comput. Appl..
[16] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[17] S. Arunkumar,et al. A review paper on preserving privacy in mobile environments , 2015, J. Netw. Comput. Appl..
[18] Elisa Bertino,et al. Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.
[19] Yong Wang,et al. A fast privacy-preserving framework for continuous location-based queries in road networks , 2015, J. Netw. Comput. Appl..
[20] Bhaskar Mondal,et al. A MULTILEVEL SECURITY SCHEME USING CHAOS BASED ENCRYPTION AND STEGANOGRAPHY FOR SECURE AUDIO COMMUNICATION , 2013 .
[21] Tao Zhou,et al. Evolution of the Internet and its cores , 2008 .
[22] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[23] Ashok Kumar Das,et al. A robust anonymous biometric-based remote user authentication scheme using smart cards , 2015, J. King Saud Univ. Comput. Inf. Sci..
[24] Michele Magno,et al. Ensuring Survivability of Resource-Intensive Sensor Networks Through Ultra-Low Power Overlays , 2014, IEEE Transactions on Industrial Informatics.
[25] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[26] S. Seksena,et al. A novel addition based image sharing scheme for secure communication of highly secret images , 2013, 2013 Annual International Conference on Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy.
[27] Jun Wang,et al. A Reputation Model Based on Behavior Trust in Wireless Sensor Networks , 2009, 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing.
[28] Bilhanan Silverajan,et al. IPv6 Addressing Strategies for IoT , 2013, IEEE Sensors Journal.