Systematic investigation and performance study of authentication and authorization techniques of Internet of Things

[1]  Antonio F. Gómez-Skarmeta,et al.  TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..

[2]  Shiju Sathyadevan,et al.  Portguard - an authentication tool for securing ports in an IoT gateway , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[3]  Dhiren R. Patel,et al.  Energy efficient integrated authentication and access control mechanisms for Internet of Things , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).

[4]  T. Senthil Murugan,et al.  Memory and machine attributes-based profiling and elliptic curve cryptography-based multi-level authentication for the security of Internet of Things , 2017, Int. J. Intell. Comput. Cybern..

[5]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[6]  Ahmed Serhrouchni,et al.  Taxonomy of authentication techniques in Internet of Things (IoT) , 2017, 2017 IEEE 15th Student Conference on Research and Development (SCOReD).

[7]  Laurence T. Yang,et al.  Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.

[8]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[9]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.