A two-level authentication scheme for clone node detection in smart cities using Internet of things
暂无分享,去创建一个
[1] Meng Zhang,et al. Test Verification and Application of a Longitudinal Temperature Force Testing Method for Long Seamless Rails Using FBG Strain Sensor , 2016, J. Sensors.
[2] Ashok K. Turuk,et al. Node coloring based replica detection technique in wireless sensor networks , 2014, Wirel. Networks.
[3] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[4] C. Jayakumar,et al. Unique identity and localization based replica node detection in hierarchical wireless sensor networks , 2017, Comput. Electr. Eng..
[5] Ashok K. Turuk,et al. A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..
[6] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[7] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[8] Takahiro Hara,et al. A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks , 2014, Secur. Commun. Networks.
[9] Mauro Conti,et al. A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..
[10] Ahmed Serhrouchni,et al. A Survey of Internet of Things (IoT) Authentication Schemes † , 2019, Sensors.
[11] P. Ganesh Kumar,et al. Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..
[12] Antonio Alfredo Ferreira Loureiro,et al. On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.
[13] Ayman El-Sayed,et al. A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks , 2018, Int. J. Commun. Syst..
[14] Ridha Ouni,et al. Reliable and energy-efficient multi-hop LEACH-based clustering protocol for wireless sensor networks , 2018, Sustain. Comput. Informatics Syst..
[15] Tooska Dargahi,et al. MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things , 2018, IEEE Transactions on Information Forensics and Security.
[16] Roberto Di Pietro,et al. Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[17] Sushil Jajodia,et al. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[18] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[19] Sherali Zeadally,et al. Internet of Things (IoT): Research, Simulators, and Testbeds , 2018, IEEE Internet of Things Journal.
[20] Priyan Malarvizhi Kumar,et al. Enhancing the security and performance of nodes in Internet of Vehicles , 2018, Concurr. Comput. Pract. Exp..
[21] Chun-Shien Lu,et al. Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[22] R. Varatharajan,et al. Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier , 2018, Future Gener. Comput. Syst..
[23] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..