MIH-SPFP: MIH-based secure cross-layer handover protocol for Fast Proxy Mobile IPv6-IoT networks
暂无分享,去创建一个
Ilsun You | Francesco Palmieri | Jianfeng Guan | Vishal Sharma | Mario Collotta | Soonhyun Kwon | Jiyoon Kim
[1] Ilsun You,et al. Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover , 2017, Future Gener. Comput. Syst..
[2] Samuel Pierre,et al. An enhanced fast handover with seamless mobility support for next-generation wireless networks , 2014, J. Netw. Comput. Appl..
[3] Ilsun You,et al. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers , 2017, Mob. Inf. Syst..
[4] Vangelis Metsis,et al. IoT Middleware: A Survey on Issues and Enabling Technologies , 2017, IEEE Internet of Things Journal.
[5] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[6] Sang-Il Choi,et al. Use of Proxy Mobile IPv6 for Mobility Management in CoAP-Based Internet-of-Things Networks , 2016, IEEE Communications Letters.
[7] Borja Bordel,et al. Building enhanced environmental traceability solutions: From Thing-to-Thing communications to Generalized Cyber-Physical Systems , 2017, J. Internet Serv. Inf. Secur..
[8] Samiran Chattopadhyay,et al. On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems , 2017, IEEE Access.
[9] Fang-Yie Leu,et al. Secure and efficient protocol for fast handover in 5G mobile Xhaul networks , 2018, J. Netw. Comput. Appl..
[10] Julie A. McCann,et al. UbiFlow: Mobility management in urban-scale software defined IoT , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[11] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[12] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.
[13] Abderrezak Rachedi,et al. A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology , 2016, Comput. Commun..
[14] Aggeliki Sgora,et al. An integrated MIH-FPMIPv6 mobility management approach for evolved-packet system architectures , 2017, J. Netw. Comput. Appl..
[15] Ilsun You,et al. Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.
[16] Hyung Heon Kim,et al. Fast-Handover Mechanism between 802.11 WLAN and 802.16 WiMax with MIH in PMIPv6 , 2009 .
[17] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[18] Isaac Woungang,et al. Impact Study of a Mobile Botnet over LTE Networks , 2016, J. Internet Serv. Inf. Secur..
[19] Qinglei Kong,et al. Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks , 2017, IEEE Internet of Things Journal.
[20] Tai-Myung Chung,et al. Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols , 2013, IEEE Transactions on Industrial Electronics.
[21] Jong-Tae Park,et al. Mobile CoAP for IoT mobility management , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[22] Qian Zhu,et al. IOT Gateway: BridgingWireless Sensor Networks into Internet of Things , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[23] Ilsun You,et al. SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks , 2017, Comput. Networks.
[24] Ian F. Akyildiz,et al. An inter-system handoff technique for the IMT-2000 system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[25] Igor V. Kotenko,et al. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[26] Young-Joo Suh,et al. Implementation and performance study of IEEE 802.21 in integrated IEEE 802.11/802.16e networks , 2009, Comput. Commun..
[27] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[28] Dongqing Xie,et al. Secure Auditing and Deduplicating Data in Cloud , 2016, IEEE Transactions on Computers.
[29] Ilsun You,et al. ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT , 2017, IEEE Access.
[30] John C. McEachen,et al. On Location Privacy in LTE Networks , 2017, IEEE Transactions on Information Forensics and Security.
[31] Fang-Yie Leu,et al. Comments on “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks” , 2018, IEEE Systems Journal.
[32] Md. Motaharul Islam,et al. Sensor Proxy Mobile IPv6 (SPMIPv6)—A Novel Scheme for Mobility Supported IP-WSNs , 2011, Sensors.
[33] Ilsun You,et al. Towards formal analysis of wireless LAN security with MIS protocol , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[34] Mohammed Atiquzzaman,et al. Cost analysis of mobility protocols , 2013, Telecommun. Syst..
[35] Dong Ren,et al. A forward fast media independent handover control scheme for Proxy Mobile IPv6 (FFMIH-PMIPv6) over heterogeneous wireless mobile network , 2017, Telecommun. Syst..
[36] Mohammed Aly Abdrabou,et al. LTE Authentication Protocol (EPS-AKA) weaknesses solution , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).
[37] Ramón Alcarria,et al. Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[38] Luca Viganò,et al. Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.
[39] Gianpiero Costantino,et al. Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[40] Sungho Choi,et al. Enhancements to FPMIPv6 for improved seamless vertical handover between LTE and heterogeneous access networks , 2013, IEEE Wireless Communications.
[41] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[42] Telemaco Melia,et al. IEEE 802.21 enabled mobile terminals for optimized WLAN/3G handovers: a case study , 2007, MOCO.