Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication
暂无分享,去创建一个
Noor Zaman | Yunyoung Nam | Naveen Chilamkurti | Abebe Diro | Haftu Reda | Abdun Mahmood | N. Chilamkurti | A. Mahmood | Yunyoung Nam | A. Diro | Noor Zaman Jhanjhi | H. Reda
[1] Muhammad Alam,et al. A payload-based mutual authentication scheme for Internet of Things , 2017, Future Gener. Comput. Syst..
[2] George C. Hadjichristofi,et al. Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[3] Wei Ni,et al. A Comprehensive Security Framework for Publish/Subscribe-Based IoT Services Communication , 2019, IEEE Access.
[4] Budi Rahardjo,et al. Attack scenarios and security analysis of MQTT communication protocol in IoT system , 2017, 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).
[5] Volker Turau,et al. A Self-Stabilizing Publish/Subscribe Middleware for IoT Applications , 2018, ACM Trans. Cyber Phys. Syst..
[6] Ioannis G. Askoxylakis,et al. Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).
[7] Prem Prakash Jayaraman,et al. OpenIoT: Open Source Internet-of-Things in the Cloud , 2014, OpenIoT@SoftCOM.
[8] Imran A. Zualkernan,et al. A smart home energy management system using IoT and big data analytics approach , 2017, IEEE Transactions on Consumer Electronics.
[9] Im-Yeong Lee,et al. Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment , 2016 .
[10] Soo Young Shin,et al. Fog Computing-Based Smart Health Monitoring System Deploying LoRa Wireless Communication , 2019 .
[11] Min Jia,et al. IoT Infrastructure and Potential Application to Smart Grid Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[12] Arumugam Paventhan,et al. An IoT based 6LoWPAN enabled experiment for water management , 2015, 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS).
[13] Shusen Yang,et al. A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.
[14] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[15] Wei Peng,et al. A secure publish/subscribe protocol for Internet of Things using identity-based cryptography , 2016, 2016 5th International Conference on Computer Science and Network Technology (ICCSNT).
[16] Kah Phooi Seng,et al. A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments , 2015, J. Netw. Comput. Appl..
[17] Chao-Chun Chen,et al. An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment , 2019, 2019 Global IoT Summit (GIoTS).
[18] Tao Zhang,et al. Fog Computing , 2017, IEEE Internet Comput..
[19] M. Ylianttila,et al. Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications , 2015, IEEE Access.
[20] Khurram J Mohammed,et al. Wireless home automation and security system using MQTT protocol , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[21] Soo Young Shin,et al. On the Application of IoT: Meteorological Information Display System Based on LoRa Wireless Communication , 2018 .
[22] Panita Pongpaibool,et al. Authorization mechanism for MQTT-based Internet of Things , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[23] V. G. Puranik,et al. IOT based vehicle traffic congestion control and monitoring system , 2017, 2017 2nd International Conference for Convergence in Technology (I2CT).
[24] G. Shanmugasundaram,et al. A comprehensive review on cloud computing security , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[25] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[26] Saad El Jaouhari,et al. A secure design of WoT services for smart cities. (Conception sécurisée de services IoT pour les villes connectées) , 2018 .
[27] Prem Prakash Jayaraman,et al. Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions , 2018, IEEE Access.
[28] Tiago Gomes,et al. A 6LoWPAN Accelerator for Internet of Things Endpoint Devices , 2018, IEEE Internet of Things Journal.
[29] Yutaka Arakawa,et al. A Smart Glove to Track Fitness Exercises by Reading Hand Palm , 2019, J. Sensors.
[30] Lei Shu,et al. Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges , 2018, IEEE Communications Surveys & Tutorials.
[31] Sherali Zeadally,et al. Fog Computing Architecture, Evaluation, and Future Research Directions , 2018, IEEE Communications Magazine.
[32] Sabeen Javaid,et al. Smart traffic management system using Internet of Things , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[33] Naveen K. Chilamkurti,et al. Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..