Current research on Internet of Things (IoT) security: A survey
暂无分享,去创建一个
[1] Jin B. Hong,et al. A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..
[2] Ajay Kumar Nain,et al. A Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design , 2017, IEEE Transactions on Computers.
[3] Victor I. Chang,et al. A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment , 2018, Future Gener. Comput. Syst..
[4] Yunsik Son,et al. Design and Implementation of the Intelligent Convergence Security System for Hazard Event on IoT Environments , 2018 .
[5] Sung-Gi Min,et al. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks , 2017, Sensors.
[6] Mingwu Zhang,et al. After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange , 2018, IEEE Systems Journal.
[7] Awais Ahmad,et al. Real-time secure communication for Smart City in high-speed Big Data environment , 2017, Future Gener. Comput. Syst..
[8] Peter Herrmann,et al. A Trust-based Resilient Routing Mechanism for the Internet of Things , 2017, ARES.
[9] Daojing He,et al. Flight Security and Safety of Drones in Airborne Fog Computing Systems , 2018, IEEE Communications Magazine.
[10] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[11] Yi Zhang,et al. Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice , 2018, J. Hardw. Syst. Secur..
[12] Narendra S. Chaudhari,et al. SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network , 2018, IEEE Access.
[13] Seokhoon Kim,et al. Safe Data Transmission Architecture Based on Cloud for Internet of Things , 2015, Wireless Personal Communications.
[14] Sheetal Kalra,et al. A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..
[15] Cheng-Chi Lee,et al. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System , 2017, Sensors.
[16] Nicola Zannone,et al. Access control in Internet-of-Things: A survey , 2019, J. Netw. Comput. Appl..
[17] Yonghun Kim,et al. Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in Infrastructureless Peer-Aware Communications , 2017, IEEE Access.
[18] Yu Zhang,et al. A remote attestation mechanism for the sensing layer nodes of the Internet of Things , 2018, Future Gener. Comput. Syst..
[19] Tao Peng,et al. Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things , 2018, Secur. Commun. Networks.
[20] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[21] Victor C. M. Leung,et al. Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.
[22] Jin Kwak,et al. System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats , 2018, KSII Trans. Internet Inf. Syst..
[23] Weisong Shi,et al. On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..
[24] Xu Wu,et al. A multi-domain trust management model for supporting RFID applications of IoT , 2017, PloS one.
[25] Zhenguo Chen,et al. Trust Model of Wireless Sensor Networks and Its Application in Data Fusion , 2017, Sensors.
[26] Mohamed Amine Ferrag,et al. Authentication Protocols for Internet of Things: A Comprehensive Survey , 2016, Secur. Commun. Networks.
[27] Im-Yeong Lee,et al. A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments , 2018, KSII Trans. Internet Inf. Syst..
[28] Avijit Mathur,et al. A secure end-to-end IoT solution , 2017 .
[29] Xiaoyu Hong,et al. Blockchain Based Credibility Verification Method for IoT Entities , 2018, Secur. Commun. Networks.
[30] Jian Shen,et al. A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server , 2017, Comput. Electr. Eng..
[31] Antonio F. Gómez-Skarmeta,et al. TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..
[32] Yu Cheng,et al. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.
[33] Taekyoung Kwon,et al. Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks , 2018, IEEE Access.
[34] Sayan Kumar Ray,et al. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things , 2019, Future Gener. Comput. Syst..
[35] V. Natarajan,et al. Lightweight key agreement protocol for IoT based on IKEv2 , 2017, Comput. Electr. Eng..
[36] Fast and efficient probing of heterogeneous IoT networks , 2018, Int. J. Netw. Manag..
[37] Mohammed Baqer M. Kamel,et al. STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET , 2017, 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[38] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[39] Zhen Qin,et al. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things , 2017, Mob. Inf. Syst..
[40] Soufiene Djahel,et al. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.
[41] Brij B. Gupta,et al. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..
[42] Ahmed Serhrouchni,et al. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..
[43] Ashok Kumar Das,et al. Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment , 2017, IEEE Internet of Things Journal.
[44] Ilsun You,et al. Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.
[45] Zahid Mahmood,et al. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks , 2017, Sensors.
[46] Dheerendra Mishra,et al. Secure and efficient user authentication scheme for multi-gateway wireless sensor networks , 2017, Ad Hoc Networks.
[47] Jin B. Hong,et al. Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities , 2018, Future Gener. Comput. Syst..
[48] Ido Nevat,et al. Secure Location of Things (SLOT): Mitigating Localization Spoofing Attacks in the Internet of Things , 2017, IEEE Internet of Things Journal.
[49] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[50] Jian Shen,et al. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..
[51] A. V. Deshpande,et al. Trust Management Model based on Fuzzy Approach for Ubiquitous Computing , 2016, Int. J. Ambient Comput. Intell..
[52] Mehdi Hosseinzadeh,et al. A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks , 2018, Wirel. Pers. Commun..
[53] Fan Wu,et al. A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.
[54] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[55] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[56] Zhuzhong Qian,et al. AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks , 2017, J. Parallel Distributed Comput..
[57] Mauro Conti,et al. Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.
[58] Widyawan,et al. Internet of Things (IoT) Framework for Granting Trust among Objects , 2017, J. Inf. Process. Syst..
[59] Kun Yang,et al. CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain , 2017, ACM Trans. Design Autom. Electr. Syst..
[60] Pavan Pongle,et al. A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[61] Masoumeh Safkhani,et al. Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things , 2017, The Journal of Supercomputing.
[62] Sung Bum Pan,et al. Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs , 2018, Wirel. Commun. Mob. Comput..
[63] Satish Anamalamudi,et al. AODV routing protocol for Cognitive radio access based Internet of Things (IoT) , 2018, Future Gener. Comput. Syst..
[64] Aref Meddeb,et al. 6LowPSec: An end-to-end security protocol for 6LoWPAN , 2018, Ad Hoc Networks.
[65] Tie Qiu,et al. A Secure Time Synchronization Protocol Against Fake Timestamps for Large-Scale Internet of Things , 2017, IEEE Internet of Things Journal.
[66] Meng Wu,et al. Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance , 2017, Comput. Networks.
[67] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[68] HwangHyun Cheon,et al. Design and Implementation of a Reliable Message Transmission System Based on MQTT Protocol in IoT , 2016 .
[69] Nasser-Eddine Rikli,et al. Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks , 2016, Int. J. Distributed Sens. Networks.
[70] Mirko Perkusich,et al. A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things , 2018, Secur. Commun. Networks.
[71] Muthu Ramachandran,et al. Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..
[72] Asaf Shabtai,et al. Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks , 2017, IEEE Transactions on Mobile Computing.
[73] Alessandro Neri,et al. Security Access Protocols in IoT Capillary Networks , 2017, IEEE Internet of Things Journal.
[74] Yacine Challal,et al. A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.
[75] Dengguo Feng,et al. AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS , 2018, Comput. Networks.
[76] Maode Ma,et al. A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks , 2016, IEEE Transactions on Industrial Informatics.
[77] Ingrid Moerman,et al. IETF Standardization in the Field of the Internet of Things (IoT): A Survey , 2013, J. Sens. Actuator Networks.
[78] Ali Reza Honarvar,et al. An Intelligent Security Approach using Game Theory to Detect DoS Attacks In IoT , 2017 .
[79] Tarik Taleb,et al. An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.
[80] Joy Iong-Zong Chen,et al. Embedding the MRC and SC Schemes into Trust Management Algorithm Applied to IoT Security Protection , 2018, Wirel. Pers. Commun..
[81] Riccardo Rovatti,et al. Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks , 2018, IEEE Transactions on Information Forensics and Security.
[82] Ion Bica,et al. A security authorization scheme for smart home Internet of Things devices , 2017, Future Gener. Comput. Syst..
[83] JiSu Park,et al. Design and Implementation of a Reliable Message Transmission System Based on MQTT Protocol in IoT , 2016, Wirel. Pers. Commun..
[84] Tong Li,et al. A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT , 2018, Secur. Commun. Networks.
[85] Edith Beigné,et al. AES Datapath Optimization Strategies for Low-Power Low-Energy Multisecurity-Level Internet-of-Things Applications , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[86] Muhammad Khurram Khan,et al. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.
[87] Jong Hyuk Park,et al. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions , 2017, J. Ambient Intell. Humaniz. Comput..
[88] Chunhua Jin,et al. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network , 2018, Journal of Medical Systems.