Privacy-Aware and Authentication based on Blockchain with Fault Tolerance for IoT enabled Fog Computing
暂无分享,去创建一个
Anas Abou El Kalam | Noureddine Idboufker | Otman Manad | Abdelkrim El Mouatasim | Oussama Mounnan | Tarik Hidar
[1] Anas Abou El Kalam,et al. FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.
[2] Jean-Luc Baril,et al. Blockchain based trust & authentication for decentralized sensor networks , 2017, ArXiv.
[3] Qun Li,et al. Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).
[4] Khaled Salah,et al. A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes , 2018, 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).
[5] T. Venkat Narayana Rao,et al. A Paradigm Shift from Cloud to Fog Computing , 2015 .
[6] Alan Kai-Hau Yeung,et al. Blockchain-Based Authentication in IoT Networks , 2018, 2018 IEEE Conference on Dependable and Secure Computing (DSC).
[7] Rui Zhang,et al. Security and Privacy on Blockchain , 2019, ACM Comput. Surv..
[8] Raffaele Giaffreda,et al. IoT and cloud convergence: Opportunities and challenges , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[9] C ByersCharles,et al. Fog Computing Distributing Data and Intelligence for Resiliency and Scale Necessary for IoT , 2015 .
[10] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[11] S. Sumathy,et al. Efficient Load Balancing Algorithm for Task Preprocessing in Fog Computing Environment , 2019 .
[12] Robert John Walters,et al. Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..
[13] Wei Peng,et al. A Blockchain-Based Authentication and Security Mechanism for IoT , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[14] Bharadwaj Veeravalli,et al. Blockchain-based decentralized content trust for docker images , 2017, Multimedia Tools and Applications.
[15] Mohsen Attaran,et al. Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance , 2017, Journal of International Technology and Information Management.
[16] François Gagnon,et al. An Efficient Blockchain-Based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment , 2019, 2019 IEEE International Conference on Communications Workshops (ICC Workshops).
[17] François Gagnon,et al. Blockchain-Based Lightweight Authentication Mechanism for Vehicular Fog Infrastructure , 2019, 2019 IEEE International Conference on Communications Workshops (ICC Workshops).
[18] Yu Yang,et al. Study and application on the architecture and key technologies for IOT , 2011, 2011 International Conference on Multimedia Technology.
[19] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[20] Christophe Rosenberger,et al. A Review on Authentication Methods , 2013 .
[21] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[22] Sudip Misra,et al. Assessment of the Suitability of Fog Computing in the Context of Internet of Things , 2018, IEEE Transactions on Cloud Computing.