Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things

[1]  J. Ritcey,et al.  Cross-Layer Device Authentication With Quantum Encryption for 5G Enabled IIoT in Industry 4.0 , 2022, IEEE Transactions on Industrial Informatics.

[2]  Kun He,et al.  XAuth: Efficient Privacy-Preserving Cross-Domain Authentication , 2022, IEEE Transactions on Dependable and Secure Computing.

[3]  Kim-Kwang Raymond Choo,et al.  Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones , 2022, IEEE Internet of Things Journal.

[4]  Xuemin Shen,et al.  Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks , 2022, IEEE Transactions on Intelligent Transportation Systems.

[5]  Yan Xu,et al.  Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT , 2021, IEEE Transactions on Industrial Electronics.

[6]  Changyuan Wang,et al.  An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[7]  Guomin Yang,et al.  An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things , 2021, IEEE Transactions on Industrial Informatics.

[8]  Saru Kumari,et al.  Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT , 2020, IEEE Internet of Things Journal.

[9]  Neng Zhang,et al.  Master-slave chain based trusted cross-domain authentication mechanism in IoT , 2020, J. Netw. Comput. Appl..

[10]  Mohammad S. Obaidat,et al.  Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs , 2020, IEEE Transactions on Industrial Informatics.

[11]  Ke Xu,et al.  Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT , 2020, IEEE Journal on Selected Areas in Communications.

[12]  Jie Cui,et al.  PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks , 2019, IEEE Transactions on Dependable and Secure Computing.

[13]  Ashok Kumar Das,et al.  Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.

[14]  Gerhard P. Hancke,et al.  Overlay Virtualized Wireless Sensor Networks for Application in Industrial Internet of Things: A Review , 2018, Sensors.

[15]  Chunhua Su,et al.  Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints , 2018, IEEE Signal Processing Magazine.

[16]  Song Han,et al.  Industrial Internet of Things: Challenges, Opportunities, and Directions , 2018, IEEE Transactions on Industrial Informatics.

[17]  Kim-Kwang Raymond Choo,et al.  A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.

[18]  Wenping Ma,et al.  CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS , 2018, Journal of Medical Systems.

[19]  Zhiwei Wang,et al.  A privacy-preserving and accountable authentication protocol for IoT end-devices with weaker identity , 2017, Future Gener. Comput. Syst..

[20]  F. Richard Yu,et al.  Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[21]  Chao Yuan,et al.  EIMAKP: Heterogeneous Cross-Domain Authenticated Key Agreement Protocols in the EIM System , 2017, Arabian Journal for Science and Engineering.

[22]  Yuguang Fang,et al.  CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks , 2016, Wirel. Networks.

[23]  Xiaoyan Zhu,et al.  An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs , 2016, IEEE Transactions on Intelligent Transportation Systems.

[24]  Xiaomin Wang,et al.  A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems , 2015, Secur. Commun. Networks.

[25]  Jie Wu,et al.  Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[26]  Kyung-Ah Shim,et al.  ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks , 2012, IEEE Transactions on Vehicular Technology.

[27]  Xingwei Wang,et al.  A Cross Heterogeneous Domain Authentication Model Based on PKI , 2011, 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming.

[28]  Xiaodong Lin,et al.  An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[29]  Antonio F. Gómez-Skarmeta,et al.  PKI-based trust management in inter-domain scenarios , 2010, Comput. Secur..

[30]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[31]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[32]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[33]  Yujian Zhang,et al.  CCAP: A Complete Cross-Domain Authentication Based on Blockchain for Internet of Things , 2022, IEEE Transactions on Information Forensics and Security.

[34]  Mehedi Masud,et al.  Cross-domain secure data sharing using blockchain for industrial IoT , 2021, J. Parallel Distributed Comput..

[35]  Jiujun Cheng,et al.  Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs , 2021, IEEE Transactions on Information Forensics and Security.

[36]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..