Implementation of Event-Based Dynamic Authentication on MQTT Protocol
暂无分享,去创建一个
[1] L. Tippett. Statistical Tables: For Biological, Agricultural and Medical Research , 1954 .
[2] Craig Valli,et al. Modelling and Evaluation of Malicious Attacks against the IoT MQTT Protocol , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[3] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[4] Matti Siekkinen,et al. TLS and energy consumption on a mobile device: A measurement study , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).
[5] Nitin Naik,et al. Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP , 2017, 2017 IEEE International Systems Engineering Symposium (ISSE).
[6] Jin Hee Chung. Adaptive Energy-Efficient SSL/TLS Method Using Fuzzy Logic for the MQTT-Based Internet of Things , 2016 .
[7] Maslina Daud,et al. Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework , 2016, ICC 2016.
[8] Zidong Wang,et al. Event-based security control for discrete-time stochastic systems , 2016 .
[9] Budi Rahardjo,et al. Attack scenarios and security analysis of MQTT communication protocol in IoT system , 2017, 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI).
[10] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[11] Tapan Kumar Hazra,et al. File encryption using Fisher-Yates Shuffle , 2015, 2015 International Conference and Workshop on Computing and Communication (IEMCON).
[12] Carsten Bormann,et al. Terminology for Constrained-Node Networks , 2014, RFC.
[13] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..