A multi-attack resilient lightweight IoT authentication scheme

[1]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[2]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[3]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[4]  Saraju P. Mohanty,et al.  Everything You Wanted to Know About Smart Cities , 2016, IEEE Consumer Electron. Mag..

[5]  Mukesh Soni,et al.  Advanced formal authentication protocol using smart cards for network applicants , 2018, Comput. Electr. Eng..

[6]  Liming Zhu,et al.  Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[7]  Mathieu Turuani,et al.  The CL-Atse Protocol Analyser , 2006, RTA.

[8]  Xiaodong Lin,et al.  Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering , 2017, IEEE Transactions on Smart Grid.

[9]  Mustafa Kocakulak,et al.  An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[10]  Sherali Zeadally,et al.  Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.

[11]  Intae Hwang,et al.  Analysis of Security Standardization for the Internet of Things , 2017, 2017 International Conference on Platform Technology and Service (PlatCon).

[12]  Chen Liang,et al.  Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G , 2016, Secur. Commun. Networks.

[13]  Alireza Esfahani,et al.  A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment , 2019, IEEE Internet of Things Journal.

[14]  Tomislav Dragicevic,et al.  Future effectual role of energy delivery: A comprehensive review of Internet of Things and smart grid , 2018, Renewable and Sustainable Energy Reviews.

[15]  Djamel Tandjaoui,et al.  A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things , 2016, 2016 Wireless Telecommunications Symposium (WTS).

[16]  Syed Musthak Ahmed,et al.  Vehicle Tracking and Monitoring System to Enhance the Safety and Security Driving Using IoT , 2017, 2017 International Conference on Recent Trends in Electrical, Electronics and Computing Technologies (ICRTEECT).

[17]  Dongxi Liu,et al.  Lightweight Mutual Authentication for IoT and Its Applications , 2017, IEEE Transactions on Sustainable Computing.

[18]  Elena Simona Lohan,et al.  Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.

[19]  Anish Mathuria,et al.  On Automated Detection of Multi-Protocol Attacks Using AVISPA , 2017, ICISS.

[20]  Ju Ren,et al.  Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.

[21]  Jaime A. Martins,et al.  Interoperability in IoT Through the Semantic Profiling of Objects , 2018, IEEE Access.

[22]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.