Design of secure session key using unique addressing and identification scheme for smart home Internet of Things network

[1]  Gary Scott Malkin,et al.  RIPng for IPv6 , 1997, RFC.

[2]  Ashraf Hossain,et al.  Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography , 2019, IEEE Sensors Letters.

[3]  Ahmed E. Kamal,et al.  Data Dissemination in IoT Using a Cognitive UAV , 2019, IEEE Transactions on Cognitive Communications and Networking.

[4]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[5]  Kim-Kwang Raymond Choo,et al.  Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things , 2019, Future Gener. Comput. Syst..

[6]  C. Ford,et al.  Ascertainment of vital status through the National Death Index and the Social Security Administration. , 1985, American journal of epidemiology.

[7]  Vanga Odelu,et al.  A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Fadi Al-Turjman,et al.  An overview of security and privacy in smart cities' IoT communications , 2019, Trans. Emerg. Telecommun. Technol..

[9]  Geeta Sharma,et al.  A secure remote user authentication scheme for smart cities e-governance applications , 2017, Journal of Reliable Intelligent Environments.

[10]  Robert M. Hinden,et al.  Unique Local IPv6 Unicast Addresses , 2005, RFC.

[11]  Fernando Gont A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC) , 2014, RFC.

[12]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[13]  Fernando Gont,et al.  Network Reconnaissance in IPv6 Networks , 2016, RFC.

[14]  Zhibo Pang,et al.  Smart Homes for Elderly Healthcare—Recent Advances and Research Challenges , 2017, Sensors.

[15]  David Pointcheval,et al.  Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.

[16]  Thomas Narten,et al.  Privacy Extensions for Stateless Address Autoconfiguration in IPv6 , 2007, RFC.

[17]  Ashok Kumar Das,et al.  A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..

[18]  Ping Wang,et al.  Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.

[19]  Andreas Jacobsson,et al.  On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[20]  Sajjad Hussain Shah,et al.  A survey: Internet of Things (IOT) technologies, applications and challenges , 2016, 2016 IEEE Smart Energy Grid Engineering (SEGE).

[21]  Andrei Gurtov,et al.  Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments , 2016, IEEE Sensors Journal.

[22]  Vijay Sivaraman,et al.  Smart IoT Devices in the Home: Security and Privacy Implications , 2018, IEEE Technology and Society Magazine.

[23]  Stephen E. Deering,et al.  An IPv6 Aggregatable Global Unicast Address Format , 1998, RFC.

[24]  Debiao He,et al.  Robust Biometrics-Based Authentication Scheme for Multiserver Environment , 2015, IEEE Systems Journal.

[25]  Xiong Li,et al.  A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[26]  Mohamed Elhoseny,et al.  The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems , 2017, Journal of Ambient Intelligence and Humanized Computing.

[27]  Hendi Yogi Prabowo,et al.  Building our defence against credit card fraud: a strategic view , 2011 .

[28]  Sheetal Kalra,et al.  Secure multi‐factor remote user authentication scheme for Internet of Things environments , 2017, Int. J. Commun. Syst..

[29]  Eun-Jun Yoon,et al.  Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem , 2010, The Journal of Supercomputing.

[30]  P. Mohamed Shakeel,et al.  A decentralized scalable security framework for end‐to‐end authentication of future IoT communication , 2019, Trans. Emerg. Telecommun. Technol..

[31]  Stephen E. Deering,et al.  IPv6 Global Unicast Address Format , 2003, RFC.

[32]  M.S. Mian,et al.  IP Address Space Management using Aggregated Fixed Length Subnet Masking , 2007, 2007 International Conference on Electrical Engineering.

[33]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[34]  Freddy K. Santoso,et al.  Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).

[35]  Yuefei Zhu,et al.  Robust smart-cards-based user authentication scheme with user anonymity , 2012, Secur. Commun. Networks.

[36]  Jianfeng Ma,et al.  An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks , 2015, Peer-to-Peer Netw. Appl..

[37]  Jianfeng Ma,et al.  Improvement of robust smart‐card‐based password authentication scheme , 2015, Int. J. Commun. Syst..

[38]  Hua Zhang,et al.  A biometric-based Password Authentication with key Exchange Scheme using Mobile Device for Multi-Server Environment , 2015 .

[39]  Yuxiang Chen,et al.  IoT-based smart homes: A review of system architecture, software, communications, privacy and security , 2018, Internet Things.

[40]  Hongxin Hu,et al.  On the Safety of IoT Device Physical Interaction Control , 2018, CCS.

[41]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[42]  Virendra Kumar Yadav,et al.  An approach to Electronic Voting System using UIDAI , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[43]  Brian E. Carpenter,et al.  Significance of IPv6 Interface Identifiers , 2014, RFC.

[44]  Carolyn Puckett The Story of the Social Security Number , 2009, Social security bulletin.

[45]  David von Oheimb The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .

[46]  Jia-Lun Tsai,et al.  Novel Anonymous Authentication Scheme Using Smart Cards , 2013, IEEE Transactions on Industrial Informatics.

[47]  Edgar R. Weippl,et al.  Lightweight Address Hopping for Defending the IPv6 IoT , 2017, ARES.

[48]  Mark W. Newman,et al.  Learning from a learning thermostat: lessons for intelligent systems for the home , 2013, UbiComp.

[49]  Shaohua Wan,et al.  Deep Learning Models for Real-time Human Activity Recognition with Smartphones , 2019, Mobile Networks and Applications.

[50]  Joseph G. Tront,et al.  The Blind Man's Bluff Approach to Security Using IPv6 , 2012, IEEE Security & Privacy.

[51]  Fan Wu,et al.  A Lightweight Authentication Scheme for Multi-gateway Wireless Sensor Networks Under IoT Conception , 2019, Arabian Journal for Science and Engineering.

[52]  Abir Chattopadhyay,et al.  Brief review on journey of secured hash algorithms , 2017, 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix).

[53]  Stephen E. Deering,et al.  IP Version 6 Addressing Architecture , 1995, RFC.

[54]  Junaid Shuja,et al.  A lightweight and compromise-resilient authentication scheme for IoTs , 2019, Trans. Emerg. Telecommun. Technol..

[55]  MaJianfeng,et al.  Improvement of robust smart-card-based password authentication scheme , 2015 .

[56]  Pierre-Louis Cayrel,et al.  A privacy-preserving code-based authentication protocol for Internet of Things , 2019, The Journal of Supercomputing.

[57]  Victor C. M. Leung,et al.  Efficient Authentication and Key Management Mechanisms for Smart Grid Communications , 2014, IEEE Systems Journal.

[58]  Dongho Won,et al.  Cryptanalysis and Improvement of a Biometrics-Based Multi-server Authentication with Key Agreement Scheme , 2012, ICCSA.

[59]  Ashok Kumar Das,et al.  A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[60]  Chien-Ming Chen,et al.  A secure authentication scheme for Internet of Things , 2017, Pervasive Mob. Comput..