Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networks
暂无分享,去创建一个
Uttam Ghosh | Ritu Garg | Nitin Gupta | Pradip Kumar Sharma | Waleed S. Alnumay | Sejal Gupta | Nitin Gupta | P. Sharma | Uttam Ghosh | R. Garg | Sejal Gupta
[1] Ruei-Hau Hsu,et al. Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions , 2019, IEEE Consumer Electronics Magazine.
[2] Graham Morgan,et al. Fog Computing Security Challenges and Future Directions [Energy and Security] , 2019, IEEE Consumer Electronics Magazine.
[3] Angelo Furfaro,et al. Using virtual environments for the assessment of cybersecurity issues in IoT scenarios , 2017, Simul. Model. Pract. Theory.
[4] Sudeep TanwarSudhanshu TyagiNeeraj Kumar,et al. Multimedia Big Data Computing for IoT Applications , 2020 .
[5] Aamir Mahmood,et al. Fog Computing Enabling Industrial Internet of Things: State-of-the-Art and Research Challenges , 2019, Sensors.
[6] Antonio J. Jara,et al. Optimized ECC Implementation for Secure Communication between Heterogeneous IoT Devices , 2015, Sensors.
[7] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[8] P. Balamuralidhar,et al. Secure MQTT for Internet of Things (IoT) , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[9] Mingzhe Jiang,et al. Leveraging Fog Computing for Healthcare IoT , 2018 .
[10] Naveen K. Chilamkurti,et al. Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.
[11] Arwa Alrawais,et al. An Attribute-Based Encryption Scheme to Secure Fog Communications , 2017, IEEE Access.
[12] V. S. Malemath,et al. Security attacks and secure routing protocols in RPL-based Internet of Things: Survey , 2017, 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI).
[13] Mario Nemirovsky,et al. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[14] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[15] Floriano De Rango,et al. Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks , 2020, Pervasive Mob. Comput..
[16] Guojun Wang,et al. A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking , 2019, Comput. Secur..
[17] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[18] R. Sakthivel,et al. High-performance ECC processor architecture design for IoT security applications , 2018, The Journal of Supercomputing.
[19] Choong Seon Hong,et al. Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges , 2019, Future Gener. Comput. Syst..
[20] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[21] Liehuang Zhu,et al. A privacy-preserving data aggregation scheme for dynamic groups in fog computing , 2020, Inf. Sci..
[22] Vijay Laxmi,et al. A Survey on Energy Efficient Routing for Delay Minimization in IoT Networks , 2018, 2018 International Conference on Intelligent Circuits and Systems (ICICS).
[23] Zurina Mohd Hanapi,et al. Comparison of ECC and RSA Algorithm in Resource Constrained Devices , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).
[24] Peng-Yu Wang,et al. Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).
[25] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[26] Joel J. P. C. Rodrigues,et al. A Survey on Security and Privacy Challenges in Device Discovery for Next-Generation Systems , 2020, IEEE Access.
[27] Tao Xiang,et al. Two Secure Privacy-Preserving Data Aggregation Schemes for IoT , 2019, Wirel. Commun. Mob. Comput..
[28] Nitin Gupta,et al. A Survey on Mobile Agent based Intrusion Detection System , 2011 .
[29] Yan Zhang,et al. A Collusion-Resistant and Privacy-Preserving Data Aggregation Protocol in Crowdsensing System , 2017, Mob. Inf. Syst..
[30] Prosanta Gope,et al. LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm , 2019, Comput. Secur..
[31] C. A. Dhote,et al. Efficient homomorphic encryption using ECC-elgamal scheme for cloud data , 2016 .
[32] Tao Jiang,et al. Edge Computing Framework for Cooperative Video Processing in Multimedia IoT Systems , 2018, IEEE Transactions on Multimedia.