A multi-attack resilient lightweight IoT authentication scheme
暂无分享,去创建一个
Yaser Jararweh | Junaid Shuja | Abdul Nasir Khan | Mazhar Ali | Faisal Rehman | Adil Adeel | Tauqeer Khalid | Abdul Nasir Khan | J. Shuja | Mazhar Ali | Y. Jararweh | Tauqeer Khalid | Faisal Rehman | Adil Adeel
[1] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[2] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[3] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[4] Saraju P. Mohanty,et al. Everything You Wanted to Know About Smart Cities , 2016, IEEE Consumer Electron. Mag..
[5] Mukesh Soni,et al. Advanced formal authentication protocol using smart cards for network applicants , 2018, Comput. Electr. Eng..
[6] Liming Zhu,et al. Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).
[7] Mathieu Turuani,et al. The CL-Atse Protocol Analyser , 2006, RTA.
[8] Xiaodong Lin,et al. Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering , 2017, IEEE Transactions on Smart Grid.
[9] Mustafa Kocakulak,et al. An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[10] Sherali Zeadally,et al. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.
[11] Intae Hwang,et al. Analysis of Security Standardization for the Internet of Things , 2017, 2017 International Conference on Platform Technology and Service (PlatCon).
[12] Chen Liang,et al. Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G , 2016, Secur. Commun. Networks.
[13] Alireza Esfahani,et al. A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment , 2019, IEEE Internet of Things Journal.
[14] Tomislav Dragicevic,et al. Future effectual role of energy delivery: A comprehensive review of Internet of Things and smart grid , 2018, Renewable and Sustainable Energy Reviews.
[15] Djamel Tandjaoui,et al. A novel lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things , 2016, 2016 Wireless Telecommunications Symposium (WTS).
[16] Syed Musthak Ahmed,et al. Vehicle Tracking and Monitoring System to Enhance the Safety and Security Driving Using IoT , 2017, 2017 International Conference on Recent Trends in Electrical, Electronics and Computing Technologies (ICRTEECT).
[17] Dongxi Liu,et al. Lightweight Mutual Authentication for IoT and Its Applications , 2017, IEEE Transactions on Sustainable Computing.
[18] Elena Simona Lohan,et al. Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.
[19] Anish Mathuria,et al. On Automated Detection of Multi-Protocol Attacks Using AVISPA , 2017, ICISS.
[20] Ju Ren,et al. Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.
[21] Jaime A. Martins,et al. Interoperability in IoT Through the Semantic Profiling of Objects , 2018, IEEE Access.
[22] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.