Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities
暂无分享,去创建一个
Khair Eddin Sabri | Azzam Sleit | Wesam Almobaideen | Maha Saadeh | A. Sleit | Maha K. Saadeh | K. Sabri | W. Almobaideen
[1] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[2] Sk Hafizul Islam,et al. An efficient and provably - secure digital signature scheme based on elliptic curve bilinear pairings , 2012 .
[3] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[4] Levente Buttyán,et al. A simple logic for authentication protocol design , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[5] P. Ray. Home Health Hub Internet of Things (H3IoT): An architectural framework for monitoring health of elderly people , 2014, 2014 International Conference on Science Engineering and Management Research (ICSEMR).
[6] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[7] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[8] Sherali Zeadally,et al. Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.
[9] B. B. Zaidan,et al. A review of smart home applications based on Internet of Things , 2017, J. Netw. Comput. Appl..
[10] Flauzac Olivier,et al. New Security Architecture for IoT Network , 2015, ANT/SEIT.
[11] Md. Iftekhar Hussain,et al. Internet of Things: challenges and research opportunities , 2017, CSI Transactions on ICT.
[12] Giancarlo Fortino,et al. Enabling IoT interoperability through opportunistic smartphone-based mobile gateways , 2017, J. Netw. Comput. Appl..
[13] Kim-Kwang Raymond Choo,et al. Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System , 2017, IEEE Transactions on Information Forensics and Security.
[14] Panwit Tuwanut,et al. A survey on internet of things architecture, protocols, possible applications, security, privacy, real-world implementation and future trends , 2015, 2015 IEEE 16th International Conference on Communication Technology (ICCT).
[15] Feng Luo,et al. The architecture and key technologies of Internet of Things in logistics , 2013 .
[16] Tarik Taleb,et al. M2M-based metropolitan platform for IMS-enabled road traffic management in IoT , 2011, IEEE Communications Magazine.
[17] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[18] Reza Curtmola,et al. Fostering participaction in smart cities: a geo-social crowdsensing platform , 2013, IEEE Communications Magazine.
[19] Yao Li,et al. Construction and Strategies in IoT Security System , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[20] Sk Hafizul Islam,et al. A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication , 2017, J. King Saud Univ. Comput. Inf. Sci..
[21] Wesam Almobaideen,et al. Internet of Things: Geographical Routing based on healthcare centers vicinity for mobile smart tourism destination , 2017 .
[22] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[23] Ling Zheng,et al. Research of Architecture and Application of Internet of Things for Smart Grid , 2012, 2012 International Conference on Computer Science and Service System.
[24] Jan Wessels. APPLICATIONS OF BAN-LOGIC , 2001 .
[25] Partha Pratim Ray. Towards an Internet of Things based architectural framework for defence , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[26] Marília Curado,et al. A resilient Internet of Things architecture for smart cities , 2017, Ann. des Télécommunications.
[27] Liang Yan,et al. Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography , 2009, CloudCom.
[28] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[29] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[30] Wade Trappe,et al. A Security Framework for the Internet of Things in the Future Internet Architecture , 2017, Future Internet.
[31] G. P. Biswas,et al. A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks , 2012, Ann. des Télécommunications.
[32] Luka Milic,et al. A novel versatile architecture for Internet of Things , 2015, 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[33] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[34] Azzam Sleit,et al. Authentication Techniques for the Internet of Things: A Survey , 2016, 2016 Cybersecurity and Cyberforensics Conference (CCC).
[35] Richard A. Frost,et al. A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks , 2012, IEEE Communications Surveys & Tutorials.
[36] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[37] Partha Pratim Ray. A survey on Internet of Things architectures , 2018, J. King Saud Univ. Comput. Inf. Sci..
[38] Chien-Hua Tsai,et al. An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents , 2017, Secur. Commun. Networks.
[39] Minghui Zhang,et al. Architecture of Internet of Things and Its Key Technology Integration Based-On RFID , 2012, 2012 Fifth International Symposium on Computational Intelligence and Design.
[40] Carles Pous,et al. A novel communication system approach for a Smart City based on the human nervous system , 2017, Future Gener. Comput. Syst..
[41] Theodore Tryfonas,et al. A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things , 2014, IEEE Transactions on Industrial Informatics.
[42] Michael Weyrich,et al. Reference Architectures for the Internet of Things , 2016, IEEE Software.
[43] Khair Eddin Sabri,et al. Internet of Things: A review to support IoT architecture's design , 2017, 2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS).
[44] Hannu Tenhunen,et al. International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .
[45] Wesam Almobaideen,et al. Geographical Route Selection Based on User Public Transportation and Service Preferences , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[46] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.