A two-level authentication scheme for clone node detection in smart cities using Internet of things

[1]  Meng Zhang,et al.  Test Verification and Application of a Longitudinal Temperature Force Testing Method for Long Seamless Rails Using FBG Strain Sensor , 2016, J. Sensors.

[2]  Ashok K. Turuk,et al.  Node coloring based replica detection technique in wireless sensor networks , 2014, Wirel. Networks.

[3]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[4]  C. Jayakumar,et al.  Unique identity and localization based replica node detection in hierarchical wireless sensor networks , 2017, Comput. Electr. Eng..

[5]  Ashok K. Turuk,et al.  A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..

[6]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[7]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[8]  Takahiro Hara,et al.  A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks , 2014, Secur. Commun. Networks.

[9]  Mauro Conti,et al.  A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring , 2017, Future Gener. Comput. Syst..

[10]  Ahmed Serhrouchni,et al.  A Survey of Internet of Things (IoT) Authentication Schemes † , 2019, Sensors.

[11]  P. Ganesh Kumar,et al.  Dynamic Detection and Prevention of Clone Attack in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..

[12]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[13]  Ayman El-Sayed,et al.  A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks , 2018, Int. J. Commun. Syst..

[14]  Ridha Ouni,et al.  Reliable and energy-efficient multi-hop LEACH-based clustering protocol for wireless sensor networks , 2018, Sustain. Comput. Informatics Syst..

[15]  Tooska Dargahi,et al.  MDSClone: Multidimensional Scaling Aided Clone Detection in Internet of Things , 2018, IEEE Transactions on Information Forensics and Security.

[16]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[17]  Sushil Jajodia,et al.  Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[18]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[19]  Sherali Zeadally,et al.  Internet of Things (IoT): Research, Simulators, and Testbeds , 2018, IEEE Internet of Things Journal.

[20]  Priyan Malarvizhi Kumar,et al.  Enhancing the security and performance of nodes in Internet of Vehicles , 2018, Concurr. Comput. Pract. Exp..

[21]  Chun-Shien Lu,et al.  Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[22]  R. Varatharajan,et al.  Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier , 2018, Future Gener. Comput. Syst..

[23]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..