Design of secure session key using unique addressing and identification scheme for smart home Internet of Things network
暂无分享,去创建一个
[1] Gary Scott Malkin,et al. RIPng for IPv6 , 1997, RFC.
[2] Ashraf Hossain,et al. Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography , 2019, IEEE Sensors Letters.
[3] Ahmed E. Kamal,et al. Data Dissemination in IoT Using a Cognitive UAV , 2019, IEEE Transactions on Cognitive Communications and Networking.
[4] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[5] Kim-Kwang Raymond Choo,et al. Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things , 2019, Future Gener. Comput. Syst..
[6] C. Ford,et al. Ascertainment of vital status through the National Death Index and the Social Security Administration. , 1985, American journal of epidemiology.
[7] Vanga Odelu,et al. A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.
[8] Fadi Al-Turjman,et al. An overview of security and privacy in smart cities' IoT communications , 2019, Trans. Emerg. Telecommun. Technol..
[9] Geeta Sharma,et al. A secure remote user authentication scheme for smart cities e-governance applications , 2017, Journal of Reliable Intelligent Environments.
[10] Robert M. Hinden,et al. Unique Local IPv6 Unicast Addresses , 2005, RFC.
[11] Fernando Gont. A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC) , 2014, RFC.
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[13] Fernando Gont,et al. Network Reconnaissance in IPv6 Networks , 2016, RFC.
[14] Zhibo Pang,et al. Smart Homes for Elderly Healthcare—Recent Advances and Research Challenges , 2017, Sensors.
[15] David Pointcheval,et al. Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.
[16] Thomas Narten,et al. Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2007, RFC.
[17] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[18] Ping Wang,et al. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.
[19] Andreas Jacobsson,et al. On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[20] Sajjad Hussain Shah,et al. A survey: Internet of Things (IOT) technologies, applications and challenges , 2016, 2016 IEEE Smart Energy Grid Engineering (SEGE).
[21] Andrei Gurtov,et al. Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.
[22] Vijay Sivaraman,et al. Smart IoT Devices in the Home: Security and Privacy Implications , 2018, IEEE Technology and Society Magazine.
[23] Stephen E. Deering,et al. An IPv6 Aggregatable Global Unicast Address Format , 1998, RFC.
[24] Debiao He,et al. Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.
[25] Xiong Li,et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
[26] Mohamed Elhoseny,et al. The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems , 2017, Journal of Ambient Intelligence and Humanized Computing.
[27] Hendi Yogi Prabowo,et al. Building our defence against credit card fraud: a strategic view , 2011 .
[28] Sheetal Kalra,et al. Secure multi‐factor remote user authentication scheme for Internet of Things environments , 2017, Int. J. Commun. Syst..
[29] Eun-Jun Yoon,et al. Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem , 2010, The Journal of Supercomputing.
[30] P. Mohamed Shakeel,et al. A decentralized scalable security framework for end‐to‐end authentication of future IoT communication , 2019, Trans. Emerg. Telecommun. Technol..
[31] Stephen E. Deering,et al. IPv6 Global Unicast Address Format , 2003, RFC.
[32] M.S. Mian,et al. IP Address Space Management using Aggregated Fixed Length Subnet Masking , 2007, 2007 International Conference on Electrical Engineering.
[33] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[34] Freddy K. Santoso,et al. Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).
[35] Yuefei Zhu,et al. Robust smart-cards-based user authentication scheme with user anonymity , 2012, Secur. Commun. Networks.
[36] Jianfeng Ma,et al. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..
[37] Jianfeng Ma,et al. Improvement of robust smart‐card‐based password authentication scheme , 2015, Int. J. Commun. Syst..
[38] Hua Zhang,et al. A biometric-based Password Authentication with key Exchange Scheme using Mobile Device for Multi-Server Environment , 2015 .
[39] Yuxiang Chen,et al. IoT-based smart homes: A review of system architecture, software, communications, privacy and security , 2018, Internet Things.
[40] Hongxin Hu,et al. On the Safety of IoT Device Physical Interaction Control , 2018, CCS.
[41] Eun-Jun Yoon,et al. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.
[42] Virendra Kumar Yadav,et al. An approach to Electronic Voting System using UIDAI , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).
[43] Brian E. Carpenter,et al. Significance of IPv6 Interface Identifiers , 2014, RFC.
[44] Carolyn Puckett. The Story of the Social Security Number , 2009, Social security bulletin.
[45] David von Oheimb. The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .
[46] Jia-Lun Tsai,et al. Novel Anonymous Authentication Scheme Using Smart Cards , 2013, IEEE Transactions on Industrial Informatics.
[47] Edgar R. Weippl,et al. Lightweight Address Hopping for Defending the IPv6 IoT , 2017, ARES.
[48] Mark W. Newman,et al. Learning from a learning thermostat: lessons for intelligent systems for the home , 2013, UbiComp.
[49] Shaohua Wan,et al. Deep Learning Models for Real-time Human Activity Recognition with Smartphones , 2019, Mobile Networks and Applications.
[50] Joseph G. Tront,et al. The Blind Man's Bluff Approach to Security Using IPv6 , 2012, IEEE Security & Privacy.
[51] Fan Wu,et al. A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception , 2019, Arabian Journal for Science and Engineering.
[52] Abir Chattopadhyay,et al. Brief review on journey of secured hash algorithms , 2017, 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix).
[53] Stephen E. Deering,et al. IP Version 6 Addressing Architecture , 1995, RFC.
[54] Junaid Shuja,et al. A lightweight and compromise-resilient authentication scheme for IoTs , 2019, Trans. Emerg. Telecommun. Technol..
[55] MaJianfeng,et al. Improvement of robust smart-card-based password authentication scheme , 2015 .
[56] Pierre-Louis Cayrel,et al. A privacy-preserving code-based authentication protocol for Internet of Things , 2019, The Journal of Supercomputing.
[57] Victor C. M. Leung,et al. Efficient Authentication and Key Management Mechanisms for Smart Grid Communications , 2014, IEEE Systems Journal.
[58] Dongho Won,et al. Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme , 2012, ICCSA.
[59] Ashok Kumar Das,et al. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..
[60] Chien-Ming Chen,et al. A secure authentication scheme for Internet of Things , 2017, Pervasive Mob. Comput..