An Efficient Mutual Authentication Scheme for Internet of Things
暂无分享,去创建一个
[1] Yutaka Ishibashi,et al. An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework , 2017, Future Gener. Comput. Syst..
[2] Christof Weinhardt,et al. A blockchain-based smart grid: towards sustainable local energy markets , 2017, Computer Science - Research and Development.
[3] Ilsun You,et al. A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks , 2019, IEEE Access.
[4] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.
[5] Hongji Yang,et al. Authentication and access control in RFID based logistics-customs clearance service platform , 2010, Int. J. Autom. Comput..
[6] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[7] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[8] Ahmed Khattab,et al. RFID Security Threats and Basic Solutions , 2017 .
[9] Abdelshakour Abuzneid,et al. Survey on Prominent RFID Authentication Protocols for Passive Tags , 2018, Sensors.
[10] Wanlei Zhou,et al. Detecting unauthorized RFID tag carrier for secure access control to a smart building , 2018 .
[11] Kevin Bouchard,et al. Exploiting Passive RFID Technology for Activity Recognition in Smart Homes , 2015, IEEE Intelligent Systems.
[12] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[13] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[14] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[15] Mouzhi Ge,et al. Exploring Big Data Clustering Algorithms for Internet of Things Applications , 2018, IoTBDS.
[16] Andrei Gurtov,et al. Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.
[17] Xiang-Yang Li,et al. One More Tag Enables Fine-Grained RFID Localization and Tracking , 2018, IEEE/ACM Transactions on Networking.
[18] Sergio Takeo Kofuji,et al. An effective intrusion detection approach for jamming attacks on RFID systems , 2015, 2015 International EURASIP Workshop on RFID Technology (EURFID).
[19] Huifang Deng,et al. Identity Authentication in RFID Based Logistics-Customs Clearance Service Platform , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[20] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[21] Reiner Dojen,et al. Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications , 2011, Comput. Electr. Eng..
[22] Andrei Gurtov,et al. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.
[23] Mostafa Azizi,et al. Classification of major security attacks against RFID systems , 2017, 2017 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS).
[24] Yuan-Ting Zhang,et al. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.
[25] Jong Hyuk Park,et al. SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home , 2017 .
[26] Jian Shen,et al. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..
[27] Maurizio Giacobbe,et al. An IoT service ecosystem for Smart Cities: The #SmartME project , 2019, Internet Things.
[28] Srinivas Sampalli,et al. Technique for preventing DoS attacks on RFID systems , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.
[29] Atul Prakash,et al. Security Implications of Permission Models in Smart-Home Application Frameworks , 2017, IEEE Security & Privacy.
[30] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[31] Biplab Sikdar,et al. Low Power Data Integrity in IoT Systems , 2018, IEEE Internet of Things Journal.
[32] Muhammad Asadullah,et al. An overview of home automation systems , 2016, 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI).
[33] Jemal H. Abawajy,et al. Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag , 2013, Int. J. Networked Distributed Comput..
[34] Mouzhi Ge,et al. Self-adaptive RFID Authentication for Internet of Things , 2019, AINA.
[35] Panagiotis G. Sarigiannidis,et al. Securing the Internet of Things: Challenges, threats and solutions , 2019, Internet Things.
[36] Mouzhi Ge,et al. Big Data for Internet of Things: A Survey , 2018, Future Gener. Comput. Syst..
[37] B. B. Gupta,et al. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.
[38] Jian Su,et al. SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system , 2018, Wirel. Networks.
[39] Yunhao Liu,et al. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.
[40] Willy Susilo,et al. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.
[41] Saraju P. Mohanty,et al. iTour: The Future of Smart Tourism: An IoT Framework for the Independent Mobility of Tourists in Smart Cities , 2018, IEEE Consumer Electronics Magazine.
[42] Mauro Conti,et al. SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT , 2019, Future Gener. Comput. Syst..
[43] Baolong Liu,et al. An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme , 2018, Inf..
[44] Mohsen Machhout,et al. Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag , 2018, Journal of Electronic Testing.
[45] Ian T. Downard,et al. Simulating Sensor Networks in NS-2 , 2004 .
[46] Victor C. M. Leung,et al. Energy Efficient Tag Identification Algorithms For RFID: Survey, Motivation And New Design , 2019, IEEE Wireless Communications.
[47] In Lee,et al. The Internet of Things for enterprises: An ecosystem, architecture, and IoT service business model , 2019, Internet Things.
[48] Sajjan G. Shiva,et al. IoMT-SAF: Internet of Medical Things Security Assessment Framework , 2019, Internet Things.
[49] Donggang Liu,et al. Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.
[50] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .