Anonymous Secure Framework in Connected Smart Home Environments
暂无分享,去创建一个
Andrei Gurtov | Jari Iinatti | An Braeken | Pardeep Kumar | Phuong Hoai Ha | An Braeken | A. Gurtov | Pardeep Kumar | J. Iinatti | P. Ha
[1] Davar Pishva,et al. A TOR-based anonymous communication approach to secure smart home appliances , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).
[2] Helena Szczerbicka,et al. AIS for misbehavior detection in wireless sensor networks: Performance and design principles , 2007, 2007 IEEE Congress on Evolutionary Computation.
[3] Uthpala Subodhani Premarathne,et al. Reliable context-aware multi-attribute continuous authentication framework for secure energy utilization management in smart homes , 2015 .
[4] Dimitrios Makrakis,et al. Device authentication mechanism for Smart Energy Home Area Networks , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[5] Chuck Yoo,et al. DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).
[6] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[7] Meng Chang Chen,et al. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics , 2014, Expert Syst. Appl..
[8] Sang Hyuk Son,et al. The price of security in wireless sensor networks , 2010, Comput. Networks.
[9] Seoung-Hyeon Lee,et al. Secure firmware validation and update for consumer devices in home networking , 2016, IEEE Transactions on Consumer Electronics.
[10] Fengtong Wen,et al. An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems , 2014, Journal of Medical Systems.
[11] Jin Kwak,et al. Secure Data Access Control Scheme for Smart Home , 2015, CSA/CUTE.
[12] Freddy K. Santoso,et al. Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).
[13] Feng Xia,et al. Design and Implementation of a Wireless Sensor Network for Smart Homes , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.
[14] Antorweep Chakravorty,et al. Privacy Preserving Data Analytics for Smart Homes , 2013, 2013 IEEE Security and Privacy Workshops.
[15] Theodore Tryfonas,et al. Life-logging in smart environments: Challenges and security threats , 2012, 2012 IEEE International Conference on Communications (ICC).
[16] Daniel Mossé,et al. Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes , 2012, 2012 Eighth International Conference on Intelligent Environments.
[17] Shuang-Hua Yang,et al. A zigbee-based home automation system , 2009, IEEE Transactions on Consumer Electronics.
[18] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[19] Guilin Zheng,et al. Residential Appliances Identification and Monitoring by a Nonintrusive Method , 2012, IEEE Transactions on Smart Grid.
[20] An Braeken,et al. Efficient Anonym Smart Card Based Authentication Scheme for Multi-Server Architecture , 2015 .
[21] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[22] Arindam Mukherjee,et al. A Survey of Communications and Networking Technologies for Energy Management in Buildings and Home Automation , 2012, J. Comput. Networks Commun..
[23] Andrei Gurtov,et al. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.
[24] Abdenour Bouzouane,et al. Correct by Construction Security Approach to Design Fault Tolerant Smart Homes for Disabled People , 2013, EUSPN/ICTH.
[25] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[26] Ying-Tsung Lee,et al. An integrated cloud-based smart home management system with community hierarchy , 2016, IEEE Transactions on Consumer Electronics.
[27] Subhasish Banerjee,et al. An Improved Smart Card based Anonymous Multi-Server Remote User Authentication Scheme , 2015 .
[28] Erman Ayday,et al. Secure Device Authentication Mechanisms for the Smart Grid-Enabled Home Area Networks , 2013 .
[29] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[30] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[31] Taeshik Shon,et al. A novel secure key paring protocol for RF4CE ubiquitous smart home systems , 2012, Personal and Ubiquitous Computing.
[32] Carles Gomez,et al. Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.
[33] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[34] Yue Li,et al. Design of a Key Establishment Protocol for Smart Home Energy Management System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[35] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[36] Won Ryu,et al. Home appliance control framework based on smart TV set-top box , 2015, IEEE Transactions on Consumer Electronics.