M2M Security Technology of CPS Based on Blockchains
暂无分享,去创建一个
Jinsong Bao | Xiaodi Huang | Yiming Zhang | Shiyong Yin | Xiaodi Huang | Jinsong Bao | Shiyong Yin | Yiming Zhang
[1] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[2] Emmanouil Magkos,et al. Modeling security in cyber-physical systems , 2012, Int. J. Crit. Infrastructure Prot..
[3] Qusay H. Mahmoud,et al. Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..
[4] Martin White,et al. Internet of Things, Blockchain and Shared Economy Applications , 2016, EUSPN/ICTH.
[5] Wenbo Wang,et al. Attacking OpenSSL Implementation of ECDSA with a Few Signatures , 2016, CCS.
[6] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[7] Mahdy Saedy,et al. Ad Hoc M2M communications and security based on 4G cellular system , 2011, 2011 Wireless Telecommunications Symposium (WTS).
[8] Maode Ma,et al. A dynamic-encryption authentication scheme for M2M security in cyber-physical systems , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[9] Houbing Song,et al. Security Enhancement via Dynamic Fountain Code for Wireless Multicast , 2017, WASA.
[10] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[11] Mohammad Abdollahi Azgomi,et al. A game-theoretic approach to model and quantify the security of cyber-physical systems , 2017, Comput. Ind..
[12] Cesare Pautasso,et al. The Blockchain as a Software Connector , 2016, 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA).
[13] Enzo Baccarelli,et al. Energy-Efficient Adaptive Resource Management for Real-Time Vehicular Cloud Services , 2019, IEEE Transactions on Cloud Computing.
[14] Qian Xu,et al. Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.
[15] Mohammad Shojafar,et al. FR trust: a fuzzy reputation-based model for trust management in semantic P2P grids , 2014, Int. J. Grid Util. Comput..
[16] Chen Ming-ze. Research of environment monitoring platform of mine area based on M2M , 2013 .
[17] Gurkan Tuna,et al. A survey on information security threats and solutions for Machine to Machine (M2M) communications , 2017, J. Parallel Distributed Comput..
[18] Guiran Chang,et al. A Survey on Security Issues of M2M Communications in Cyber-Physical Systems , 2012, KSII Trans. Internet Inf. Syst..
[19] Megan Kline,et al. Towards Firmware Analysis of Industrial Internet of Things (IIoT) - Applying Symbolic Analysis to IIoT Firmware Vetting , 2017, IoTBDS.
[20] Myungsik Yoo,et al. Application of M2M technology to manufacturing systems , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).
[21] Andrew W. Appel,et al. Verification of a Cryptographic Primitive: SHA-256 , 2015, TOPL.
[22] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[23] Rong Zheng,et al. Cyber-physical systems: Milestones and research challenges , 2012, Comput. Commun..
[24] Jiangtao Wen,et al. The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.
[25] Liquan Chen,et al. An Improved Direct Anonymous Attestation Scheme for M2 M Networks , 2011 .
[26] Insup Lee,et al. Security Challenges in Next Generation Cyber Physical Systems , 2006 .
[27] Andrew Lippman,et al. MedRec: Using Blockchain for Medical Data Access and Permission Management , 2016, 2016 2nd International Conference on Open and Big Data (OBD).
[28] Wei Jiang,et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.
[29] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[30] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[31] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[32] Siu-Ming Yiu,et al. Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[33] Andreas Leicher,et al. TRUST IN M 2 M COMMUNICATION The New Security Threats , 2009 .
[34] Inhyok Cha,et al. Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.