A testbed implementation of secure and lightweight privacy preservation mechanism using scrambled Fibonacci and XOR for ZigBee
暂无分享,去创建一个
[1] Edna Elizabeth N.,et al. Design of a two-factor authentication ticketing system for transit applications , 2016, 2016 IEEE Region 10 Conference (TENCON).
[2] Benjamin W. P. Ramsey,et al. Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking , 2014, 2014 IEEE Military Communications Conference.
[3] Sherali Zeadally,et al. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.
[4] Jan Durech,et al. Security attacks to ZigBee technology and their practical realization , 2014, 2014 IEEE 12th International Symposium on Applied Machine Intelligence and Informatics (SAMI).
[5] Gong Shang-Fu,et al. Solution of Home Security Based on ARM and ZigBee , 2016, 2016 International Symposium on Computer, Consumer and Control (IS3C).
[6] Uttam Ghosh,et al. Considering security for ZigBee protocol using message authentication code , 2015, 2015 Annual IEEE India Conference (INDICON).
[7] Răzvan Andrei Gheorghiu,et al. Analysis of the Possibility to Implement ZigBee Communications in Road Junctions , 2017 .
[8] Md. Azmi Bin Karnain,et al. A Review on ZigBee Security Enhancement in Smart Home Environment , 2015, ICISS 2015.
[9] Hwajeong Seo,et al. ZigBee security for Home automation using attribute-based cryptography , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[10] Yu Cheng,et al. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.
[11] Todd R. Andel,et al. Exploring security in ZigBee networks , 2014, CISR '14.
[12] Rozeha A. Rashid,et al. Experimental studies of the ZigBee frequency agility mechanism in home area networks , 2014, 39th Annual IEEE Conference on Local Computer Networks Workshops.
[13] Michail Maniatakos,et al. Privacy-preserving functional IP verification utilizing fully homomorphic encryption , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[14] R. N. Uma,et al. Battery power-aware encryption , 2006, TSEC.
[15] Keijo Haataja,et al. Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned , 2014, 2014 14th International Conference on Hybrid Intelligent Systems.
[16] Safwan El Assad,et al. Improvement of the Security of ZigBee by a New Chaotic Algorithm , 2014, IEEE Systems Journal.
[17] Abderrahim Sekkaki,et al. New Security Approach for ZigBee Weaknesses , 2014, EUSPN/ICTH.
[18] Cédric Lauradoux,et al. Preserving privacy in secured ZigBee wireless sensor networks , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[19] Lohit Penubaku,et al. A novel approach of using security enabled Zigbee in vehicular communication , 2016, 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).
[20] Maode Ma,et al. Security enhancements on Home Area Networks in smart grids , 2016, 2016 IEEE Region 10 Conference (TENCON).
[21] Alfred Daniel. Vehicle to vehicle communication using Zigbee protocol , 2014, SAC.