Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching

[1]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[2]  Jussi Kangasharju,et al.  Real-world sybil attacks in BitTorrent mainline DHT , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[3]  Audun Jøsang,et al.  Optimal Trust Network Analysis with Subjective Logic , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[4]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[5]  Chen Qian,et al.  Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[6]  Qin Zhang,et al.  A concise forwarding information base for scalable and fast name lookups , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).

[7]  Klaus Wehrle,et al.  Towards viable certificate-based authentication for the internet of things , 2013, HotWiSec '13.

[8]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[9]  Mohsen Guizani,et al.  An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[10]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[11]  Suat Özdemir,et al.  Security in internet of things: A survey , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).

[12]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[13]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[14]  Li Fan,et al.  Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.

[15]  Jiguo Yu,et al.  A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[16]  Hyggo Oliveira de Almeida,et al.  Standard-based and distributed health information sharing for mHealth IoT systems , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).

[17]  Mohamad Abou El-Nasr,et al.  CBSTM-IoT: Context-based social trust model for the Internet of Things , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).

[18]  Tong Zhang,et al.  Trust evaluation method for clustered wireless sensor networks based on cloud model , 2016, Wirel. Networks.

[19]  Xiang Zhou,et al.  A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.

[20]  Jiguo Yu,et al.  SecureGuard: A Certificate Validation System in Public Key Infrastructure , 2018, IEEE Transactions on Vehicular Technology.

[21]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[22]  Kemal Akkaya,et al.  Efficient Certificate Verification for Vehicle-to-Grid Communications , 2017, FNSS.

[23]  Bruce M. Maggs,et al.  CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[24]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[25]  Federico Ferrari,et al.  FlockLab: A testbed for distributed, synchronized tracing and profiling of wireless embedded systems , 2013, 2013 ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[26]  Ingrid Moerman,et al.  Secure communication in IP-based wireless sensor networks via a trusted gateway , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[27]  Kuldeep Singh,et al.  A fuzzy-based trust model for flying ad hoc networks (FANETs) , 2018, Int. J. Commun. Syst..

[28]  Masahiro Mambo,et al.  Verifying the Validity of Public Key Certificates Using Edge Computing , 2017 .

[29]  Xin Li,et al.  An IoT Data Communication Framework for Authenticity and Integrity , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[30]  Xuemin Shen,et al.  EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Mobile Computing.

[31]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[32]  Dan Boneh,et al.  The Case for Prefetching and Prevalidating TLS Server Certificates , 2012, NDSS.

[33]  Jose L. Muñoz,et al.  COACH: COllaborative certificate stAtus CHecking mechanism for VANETs , 2013, J. Netw. Comput. Appl..

[34]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[35]  Hannu Tenhunen,et al.  Session Resumption-Based End-to-End Security for Healthcare Internet-of-Things , 2015, 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing.

[36]  Dan Pei,et al.  WiFi can be the weakest link of round trip network latency in the wild , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[37]  Namje Park,et al.  Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle , 2015, Sensors.

[38]  Anna N. Kim,et al.  When HART goes wireless: Understanding and implementing the WirelessHART standard , 2008, 2008 IEEE International Conference on Emerging Technologies and Factory Automation.

[39]  Carlisle M. Adams,et al.  X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.

[40]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[41]  Hsiao-Hwa Chen,et al.  An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.