Energy-aware dynamic Internet of Things security system based on Elliptic Curve Cryptography and Message Queue Telemetry Transport protocol for mitigating Replay attacks
暂无分享,去创建一个
Floriano De Rango | Mauro Tropea | Peppino Fazio | Giuseppe Potrino | M. Tropea | F. Rango | P. Fazio | Giuseppe Potrino
[1] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[2] Leckraj Nagowah,et al. A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare , 2017, 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS).
[3] P Parhana,et al. Review on Internet of Things: Recent Applications and its Challenges , 2017 .
[4] Katinka Wolter,et al. A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks , 2018, Pervasive Mob. Comput..
[5] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[6] Ramjee Prasad,et al. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.
[7] Floriano De Rango,et al. Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i , 2006, EURASIP J. Wirel. Commun. Netw..
[8] Namje Park,et al. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle , 2015, Sensors.
[9] Chien-Ming Chen,et al. A secure authentication scheme for Internet of Things , 2017, Pervasive Mob. Comput..
[10] A Vanathi. Cloning Attack Authenticator in Wireless Sensor Networks , 2012 .
[11] Sheetal Kalra,et al. Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..
[12] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[13] Giuseppe Piro,et al. Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.
[14] Abdelouahed Zakari,et al. New approach for securing communication over MQTT protocol A comparaison between RSA and Elliptic Curve , 2016, 2016 Third International Conference on Systems of Collaboration (SysCo).
[15] Robert John Walters,et al. Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..
[16] Ching-Hsien Hsu,et al. Case of ARM emulation optimization for offloading mechanisms in Mobile Cloud Computing , 2017, Future Gener. Comput. Syst..
[17] Floriano De Rango,et al. Performance evaluation of secure AODV with trust management under an energy aware perspective , 2014, International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2014).
[18] Yasir Saleem,et al. Resource Management in Mobile Sink Based Wireless Sensor Networks through Cloud Computing , 2014 .
[19] Naveen K. Chilamkurti,et al. Lightweight Cybersecurity Schemes Using Elliptic Curve Cryptography in Publish-Subscribe fog Computing , 2017, Mobile Networks and Applications.
[20] Ioannis Chatzigiannakis,et al. A privacy-preserving smart parking system using an IoT elliptic curve based security platform , 2016, Comput. Commun..
[21] Feng Xia,et al. Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges , 2015, J. Netw. Comput. Appl..
[22] Marco Conti,et al. Energy efficient distributed analytics at the edge of the network for IoT environments , 2018, Pervasive Mob. Comput..
[23] Eric Rescorla,et al. SSL and TLS: Designing and Building Secure Systems , 2000 .
[24] P. Balamuralidhar,et al. Secure MQTT for Internet of Things (IoT) , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[25] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[26] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[27] Mubashir Husain Rehmani,et al. Mobile Edge Computing: Opportunities, solutions, and challenges , 2017, Future Gener. Comput. Syst..
[28] Jayabhaskar Muthukuru,et al. Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things , 2016 .
[29] Ahmed Serhrouchni,et al. A lightweight IoT security protocol , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).