A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network
暂无分享,去创建一个
Yuan-Ting Zhang | Heye Zhang | Wanqing Wu | Sandeep Pirbhulal | Subhas Mukhopadhyay | Hemant Ghayvat | Md Eshrat E. Alahi | Heye Zhang | Yuan-ting Zhang | Wanqing Wu | Sandeep Pirbhulal | S. Mukhopadhyay | H. Ghayvat | M. Alahi
[1] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[2] Vaishali Sahare,et al. Implementation of data confidentiality for providing high security in Wireless Sensor Network , 2015, 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[3] A. Benslimane,et al. Analytical study of security aspects in 6LoWPAN networks , 2013, 2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M).
[4] Diane J. Cook,et al. COM: A method for mining and monitoring human activity patterns in home-based health monitoring systems , 2013, ACM Trans. Intell. Syst. Technol..
[5] Hans Dobbertin,et al. Cryptanalysis of MD4 , 1996, Journal of Cryptology.
[6] Houcine Chafouk,et al. IKEv2 Authentication Exchange Model in NS-2 , 2014, 2014 International Symposium on Computer, Consumer and Control.
[7] Jie Liu,et al. Wellness Sensor Networks: A Proposal and Implementation for Smart Home for Assisted Living , 2015, IEEE Sensors Journal.
[8] W. Dargie,et al. Dynamic Power Management in Wireless Sensor Networks: State-of-the-Art , 2012, IEEE Sensors Journal.
[9] Md. Iftekhar Hussain,et al. A comparison of 802.11ah and 802.15.4 for IoT , 2016, ICT Express.
[10] Howard M. Heys,et al. FPGA implementation of MD5 hash algorithm , 2001, Canadian Conference on Electrical and Computer Engineering 2001. Conference Proceedings (Cat. No.01TH8555).
[11] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[12] John W. Lockwood,et al. Dynamic hardware plugins in an FPGA with partial run-time reconfiguration , 2002, DAC '02.
[13] Giancarlo Fortino,et al. A WSN-Based Building Management Framework to Support Energy-Saving Applications in Buildings , 2012 .
[14] Thiemo Voigt,et al. Lightweight IKEv2: A Key Management Solution for both Compressed IPsec and IEEE 802.15.4 Security , 2012 .
[15] Donghoon Chang,et al. RC4-Hash: A New Hash Function Based on RC4 , 2006, INDOCRYPT.
[16] Bhaskar Mondal,et al. An Improved Cryptography Scheme for Secure Image Communication , 2013 .
[17] Tzonelih Hwang,et al. BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.
[18] Ayan Banerjee,et al. PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks , 2010, IEEE Transactions on Information Technology in Biomedicine.
[19] John A. Stankovic,et al. ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring , 2006 .
[20] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[21] Subramaniam Shamala,et al. Mobility management for IoT: a survey , 2016, EURASIP Journal on Wireless Communications and Networking.
[22] Dipankar Raychaudhuri,et al. A Mobile Phone Based WSN Infrastructure for IoT over Future Internet Architecture , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[23] A. K. Mandal,et al. Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[24] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..
[25] Lei Zhang,et al. Wireless Sensor Networks and the Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[26] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[27] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[28] Shanta Mandal. A Secure Encryption Logic for Communication in Wireless Sensor Networks , 2012 .
[29] Vasos Vassiliou,et al. Inter-mobility support in controlled 6LoWPAN networks , 2010, 2010 IEEE Globecom Workshops.
[30] P. Shanthi,et al. Lightweight Security Algorithm For Wireless Node Connected with IoT , 2016 .
[31] Franco Cicirelli,et al. On the Design of Smart Homes: A Framework for Activity Recognition in Home Environment , 2016, Journal of Medical Systems.
[32] Sana Hoor Jokhio,et al. Light-weight framework for security-sensitive wireless sensor networks applications , 2013, IET Wirel. Sens. Syst..
[33] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[34] Jessye Dos Santos,et al. Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis , 2014, IEEE Internet of Things Journal.
[35] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[36] Zhou Ning,et al. FPGA implementation of SHA-1 algorithm , 2003, ASICON 2003.
[37] Subhas Chandra Mukhopadhyay,et al. Internet of Things for smart homes and buildings , 2015 .
[38] Michel Auguin,et al. A Joint Duty-Cycle and Transmission Power Management for Energy Harvesting WSN , 2014, IEEE Transactions on Industrial Informatics.
[39] Mohsen Guizani,et al. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.