Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model

[1]  Khairul Azmi,et al.  Lightweight Security Mechanism over MQTT Protocol for IoT Devices , 2020 .

[2]  Rashid A. Saeed,et al.  Optimizing Energy Consumption for Cloud Internet of Things , 2020, Frontiers in Physics.

[3]  Mohammad Kamrul Hasan,et al.  Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology , 2020, Secur. Commun. Networks.

[4]  Marco Tagliasacchi,et al.  Open-source and flexible framework for visual sensor networks , 2015, ICDSC.

[5]  Prasad Calyam,et al.  Flexible IoT security middleware for end-to-end cloud-fog communication , 2018, Future Gener. Comput. Syst..

[6]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[7]  Alessandro Cilardo,et al.  Designing a SHA-256 processor for blockchain-based IoT applications , 2020, Internet Things.

[8]  Shay Gueron,et al.  Fast prime field elliptic-curve cryptography with 256-bit primes , 2014, Journal of Cryptographic Engineering.

[9]  Chen Heng,et al.  Client-Aware Negotiation for Secure and Efficient Data Transmission , 2020, Energies.

[10]  十河茂幸 Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey , 2020 .

[11]  Guojun Wang,et al.  Edge-based differential privacy computing for sensor-cloud systems , 2020, J. Parallel Distributed Comput..

[12]  David A. Cooper,et al.  Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations , 2005 .

[13]  Namhi Kang,et al.  ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[14]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[15]  Tiago M. Fernández-Caramés,et al.  A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications , 2017, Sensors.

[16]  M. Shamim Hossain,et al.  A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography , 2017, IEEE Access.

[17]  Noor Zaman,et al.  Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication , 2020, IEEE Access.

[18]  Gerhard P Hancke,et al.  Low Power Wide Area Network, Cognitive Radio and the Internet of Things: Potentials for Integration , 2020, Sensors.

[19]  Jianying Zhou,et al.  Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.

[20]  Fadi Al-Turjman,et al.  A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems , 2020, IEEE Access.

[21]  Marco Levorato,et al.  Performance Analysis of End-to-End Security Schemes in Healthcare IoT , 2018, ANT/SEIT.

[22]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[23]  Samer Jaloudi,et al.  Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study , 2019, Future Internet.

[24]  Xiong Luo,et al.  A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things , 2018, IEEE Access.

[25]  Liudong Xing,et al.  Network Simplification and K-Terminal Reliability Evaluation of Sensor-Cloud Systems , 2020, IEEE Access.

[26]  Suresh Sankaranarayanan,et al.  Publish/subscribe based multi-tier edge computational model in Internet of Things for latency reduction , 2019, J. Parallel Distributed Comput..

[27]  Sheroz Khan,et al.  Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications , 2021, IEEE Access.

[28]  Siti Norul Huda Sheikh Abdullah,et al.  Security Vulnerabilities, Attacks, Threats and the Proposed Countermeasures for the Internet of Things Applications , 2020 .

[29]  An Braeken,et al.  Toward the inclusion of end-to-end security in the OM2M platform , 2020 .

[30]  Victor C. M. Leung,et al.  A Reliable Trust Computing Mechanism Based on Multisource Feedback and Fog Computing in Social Sensor Cloud , 2020, IEEE Internet of Things Journal.

[31]  Ikram Ud Din,et al.  DDR-ESC: A Distributed and Data Reliability Model for Mobile Edge-Based Sensor-Cloud , 2020, IEEE Access.

[32]  Tiago M. Fernández-Caramés,et al.  Design, Implementation and Practical Evaluation of an IoT Home Automation System for Fog Computing Applications Based on MQTT and ZigBee-WiFi Sensor Nodes , 2018, Sensors.

[33]  Zulkifli Ahmad,et al.  Challenges in Multi-Layer Data Security for Video Steganography Revisited , 2018 .

[34]  Latha Tamilselvan,et al.  Elliptic curve Diffie–Hellman cryptosystem in big data cloud security , 2020, Cluster Computing.

[35]  Eklas Hossain,et al.  A Systematic Review on Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications , 2021, Sustainability.

[36]  Azana Hafizah Mohd Aman,et al.  Internet of Things and Its Applications: A Comprehensive Survey , 2020, Symmetry.

[37]  Ravi Kishore Kodali,et al.  Fuzzy controlled scalar multiplication for ECC , 2013, IEEE 2013 Tencon - Spring.

[38]  Thomas Ledoux,et al.  Investigating Energy Consumption and Performance Trade-Off for Interactive Cloud Application , 2017, IEEE Transactions on Sustainable Computing.