Security of Broadcast Authentication for Cloud-Enabled Wireless Medical Sensor Devices in 5G Networks
暂无分享,去创建一个
Zakirul Alam Bhuiyan | Ian McAndrew | Abdullah Al Hayajneh | Z. Bhuiyan | A. Hayajneh | Ian McAndrew
[1] Wenliang Du,et al. Diversify sensor nodes to improve resilience against node compromise , 2006, SASN '06.
[2] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[3] Peter Langendörfer,et al. How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.
[4] Hideya Ochiai,et al. Security Assessment Model to Analysis DOS Attacks in WSN , 2019, IRICT.
[5] Nadjib Badache,et al. Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..
[6] Gary M. Weiss,et al. Biometric Authentication and Verification for Medical Cyber Physical Systems , 2018, Electronics.
[7] An Braeken,et al. Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks , 2019, IEEE Access.
[8] Per Lynggaard,et al. Deploying 5G-Technologies in Smart City and Smart Home Wireless Sensor Networks with Interferences , 2015, Wirel. Pers. Commun..
[9] Miodrag Potkonjak,et al. mHealthMon: Toward Energy-Efficient and Distributed Mobile Health Monitoring Using Parallel Offloading , 2013, 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[10] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[11] Dushantha Nalin K. Jayakody,et al. A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.
[12] Roberta Spolon,et al. μTESLA protocol in vehicular networks , 2017, 2017 12th Iberian Conference on Information Systems and Technologies (CISTI).
[13] Peng Ning,et al. Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.
[14] Shree Krishna Sharma,et al. The Potential Short- and Long-Term Disruptions and Transformative Impacts of 5G and Beyond Wireless Networks: Lessons Learnt From the Development of a 5G Testbed Environment , 2020, IEEE Access.
[15] Konstantinos Katzis,et al. 5G and wireless body area networks , 2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[16] Shoubin Wang,et al. A Survey of Time Synchronization Algorithms for Wireless Sensor Networks , 2019, 2019 Chinese Control Conference (CCC).
[17] Deborah Estrin,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .
[18] Wei You,et al. A Systematic Analysis Method for 5G Non-Access Stratum Signalling Security , 2019, IEEE Access.
[19] Athanasios V. Vasilakos,et al. A cloud-based interference-aware remote health monitoring system for non-hospitalized patients , 2014, 2014 IEEE Global Communications Conference.
[20] Aiqing Zhang,et al. Security-Aware and Privacy-Preserving D2D Communications in 5G , 2017, IEEE Network.
[21] Padmalaya Nayak,et al. A Fuzzy Logic-Based Clustering Algorithm for WSN to Extend the Network Lifetime , 2016, IEEE Sensors Journal.
[22] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[23] Ali Al-Shaikhi,et al. Asynchronous Time Synchronization Protocol for WSNs , 2019, 2019 16th International Multi-Conference on Systems, Signals & Devices (SSD).
[24] Elaine Shi,et al. Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[25] Majaz Moonis,et al. Mobile cloud computing based stroke healthcare system , 2019, Int. J. Inf. Manag..
[26] Taekyoung Kwon,et al. Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks , 2018, IEEE Access.
[27] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[28] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[29] Abderrezak Guessoum,et al. FPGA implementation of a wireless sensor node with built-in security coprocessors for secured key exchange and data transfer , 2020 .
[30] Leslie Lamport,et al. Constructing Digital Signatures from a One Way Function , 2016 .
[31] Divya Sharma,et al. Body area networks: A survey , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[32] Ya-Fen Chang,et al. An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks , 2017, J. Inf. Secur. Appl..
[33] Kechar Bouabdellah,et al. Formal verification of a new authenticated and optimized version of AOMDV for WSN , 2020, Int. J. Commun. Syst..
[34] Adrian Perrig,et al. Seven cardinal properties of sensor network broadcast authentication , 2006, SASN '06.
[35] Yongli Wang,et al. A trust enhancement scheme for cluster-based wireless sensor networks , 2018, The Journal of Supercomputing.
[36] Thaier Hayajneh,et al. Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation , 2016, Secur. Commun. Networks.
[37] Sibi Amaran,et al. An Enhanced Scheme of Excluding Compromised Nodes in Wireless Sensor Networks , 2019 .
[38] Athanasios V. Vasilakos,et al. Cloud-assisted body area networks: state-of-the-art and future challenges , 2014, Wirel. Networks.
[39] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.