A Survey of Authentication Schemes in the Internet of Things
暂无分享,去创建一个
[1] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[2] Chun-I Fan,et al. Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.
[3] Lisandro Zambenedetti Granville,et al. A DTLS-based security architecture for the Internet of Things , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[4] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[5] Mohamed Abid,et al. An efficient scheme for anonymous communication in IoT , 2015, 2015 11th International Conference on Information Assurance and Security (IAS).
[6] Sheetal Kalra,et al. Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..
[7] Ruoshan Kong. The Simulation for Network Mobility Based on NS2 , 2008, 2008 International Conference on Computer Science and Software Engineering.
[8] Muhammad Khurram Khan,et al. An efficient remote mutual authentication scheme using smart mobile phone over insecure networks , 2015, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA).
[9] Biplab Sikdar,et al. A Light-Weight Mutual Authentication Protocol for IoT Systems , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[10] Xiaojiang Du,et al. An Location-aware Authentication Scheme for Cross-domain Internet of Thing Systems , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).
[11] Fabiano Hessel,et al. The importance of a standard securit y archit ecture for SOA-based iot middleware , 2015, IEEE Communications Magazine.
[12] Ping Wang,et al. Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks , 2014, Ad Hoc Networks.
[13] L. Javier García-Villalba,et al. SDN: Evolution and Opportunities in the Development IoT Applications , 2014, Int. J. Distributed Sens. Networks.
[14] Fadi Al-Turjman,et al. CAR Approach for the Internet of Things , 2016, Canadian Journal of Electrical and Computer Engineering.
[15] Ruhul Amin,et al. A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.
[16] Ning Zhang,et al. S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol , 2017, IEEE Internet of Things Journal.
[17] Jian Shen,et al. An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..
[18] Chin-Chen Chang,et al. Notes on "Secure authentication scheme for IoT and cloud servers" , 2017, Pervasive Mob. Comput..
[19] Chien-Ming Chen,et al. A secure authentication scheme for Internet of Things , 2017, Pervasive Mob. Comput..
[20] Inwhee Joe,et al. An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things , 2016, Wirel. Pers. Commun..
[21] Burak Kantarci,et al. Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.
[22] Giuseppe Piro,et al. Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption , 2017, IEEE Embedded Systems Letters.
[23] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[24] Daniel W. Engels,et al. Black SDN for the Internet of Things , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[25] Hannu Tenhunen,et al. International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .
[26] Sanaa Taha,et al. An anonymous mutual authentication scheme for healthcare RFID systems , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).
[27] Ruhul Amin,et al. Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..
[28] Mohammad S. Obaidat,et al. Security analysis and design of an efficient ECC-based two-factor password authentication scheme , 2016, Secur. Commun. Networks.
[29] Bryan Scotney,et al. Smart City Architecture and its Applications Based on IoT , 2015, ANT/SEIT.
[30] Ricardo Neisse,et al. A Model-Based Security Toolkit for the Internet of Things , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.
[31] Atul Kumar,et al. A Novel Approach for Secure Mobile-Voting using Biometrics in Conjunction with Elliptic Curve Crypto-Stegano Scheme , 2011 .
[32] Xiong Li,et al. A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks , 2015, Comput. Electr. Eng..
[33] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[34] Wei-Kuan Shih,et al. Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data , 2013, IET Inf. Secur..
[35] Soma Bandyopadhyay,et al. Why not keep your personal data secure yet private in IoT?: Our lightweight approach , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[36] Noor Zaman,et al. Proposing secure and lightweight authentication scheme for IoT based E-health applications , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).
[37] Liping Zhang,et al. Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement , 2018, IEEE Transactions on Industrial Electronics.
[38] Walid Saad,et al. On the authentication of devices in the Internet of things , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[39] Ruhul Amin,et al. Anonymity preserving secure hash function based authentication scheme for consumer USB mass storage device , 2015, Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT).
[40] Xiong Li,et al. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems , 2015, Journal of Medical Systems.
[41] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[42] Subhasish Dhal,et al. A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System , 2018, Comput. Secur..