Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model
暂无分享,去创建一个
Khairul Azmi Abu Bakar | Mohammad Kamrul Hasan | Sanaz Amanlou | M. Hasan | K. A. Bakar | Sanaz Amanlou
[1] Khairul Azmi,et al. Lightweight Security Mechanism over MQTT Protocol for IoT Devices , 2020 .
[2] Rashid A. Saeed,et al. Optimizing Energy Consumption for Cloud Internet of Things , 2020, Frontiers in Physics.
[3] Mohammad Kamrul Hasan,et al. Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology , 2020, Secur. Commun. Networks.
[4] Marco Tagliasacchi,et al. Open-source and flexible framework for visual sensor networks , 2015, ICDSC.
[5] Prasad Calyam,et al. Flexible IoT security middleware for end-to-end cloud-fog communication , 2018, Future Gener. Comput. Syst..
[6] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[7] Alessandro Cilardo,et al. Designing a SHA-256 processor for blockchain-based IoT applications , 2020, Internet Things.
[8] Shay Gueron,et al. Fast prime field elliptic-curve cryptography with 256-bit primes , 2014, Journal of Cryptographic Engineering.
[9] Chen Heng,et al. Client-Aware Negotiation for Secure and Efficient Data Transmission , 2020, Energies.
[10] 十河茂幸. Securing Communication between Fog Computing and IoT Using Constrained Application Protocol (CoAP): A Survey , 2020 .
[11] Guojun Wang,et al. Edge-based differential privacy computing for sensor-cloud systems , 2020, J. Parallel Distributed Comput..
[12] David A. Cooper,et al. Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations , 2005 .
[13] Namhi Kang,et al. ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[14] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[15] Tiago M. Fernández-Caramés,et al. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications , 2017, Sensors.
[16] M. Shamim Hossain,et al. A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography , 2017, IEEE Access.
[17] Noor Zaman,et al. Lightweight Authenticated-Encryption Scheme for Internet of Things Based on Publish-Subscribe Communication , 2020, IEEE Access.
[18] Gerhard P Hancke,et al. Low Power Wide Area Network, Cognitive Radio and the Internet of Things: Potentials for Integration , 2020, Sensors.
[19] Jianying Zhou,et al. Faster Authenticated Key Agreement With Perfect Forward Secrecy for Industrial Internet-of-Things , 2020, IEEE Transactions on Industrial Informatics.
[20] Fadi Al-Turjman,et al. A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems , 2020, IEEE Access.
[21] Marco Levorato,et al. Performance Analysis of End-to-End Security Schemes in Healthcare IoT , 2018, ANT/SEIT.
[22] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[23] Samer Jaloudi,et al. Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study , 2019, Future Internet.
[24] Xiong Luo,et al. A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things , 2018, IEEE Access.
[25] Liudong Xing,et al. Network Simplification and K-Terminal Reliability Evaluation of Sensor-Cloud Systems , 2020, IEEE Access.
[26] Suresh Sankaranarayanan,et al. Publish/subscribe based multi-tier edge computational model in Internet of Things for latency reduction , 2019, J. Parallel Distributed Comput..
[27] Sheroz Khan,et al. Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications , 2021, IEEE Access.
[28] Siti Norul Huda Sheikh Abdullah,et al. Security Vulnerabilities, Attacks, Threats and the Proposed Countermeasures for the Internet of Things Applications , 2020 .
[29] An Braeken,et al. Toward the inclusion of end-to-end security in the OM2M platform , 2020 .
[30] Victor C. M. Leung,et al. A Reliable Trust Computing Mechanism Based on Multisource Feedback and Fog Computing in Social Sensor Cloud , 2020, IEEE Internet of Things Journal.
[31] Ikram Ud Din,et al. DDR-ESC: A Distributed and Data Reliability Model for Mobile Edge-Based Sensor-Cloud , 2020, IEEE Access.
[32] Tiago M. Fernández-Caramés,et al. Design, Implementation and Practical Evaluation of an IoT Home Automation System for Fog Computing Applications Based on MQTT and ZigBee-WiFi Sensor Nodes , 2018, Sensors.
[33] Zulkifli Ahmad,et al. Challenges in Multi-Layer Data Security for Video Steganography Revisited , 2018 .
[34] Latha Tamilselvan,et al. Elliptic curve Diffie–Hellman cryptosystem in big data cloud security , 2020, Cluster Computing.
[35] Eklas Hossain,et al. A Systematic Review on Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications , 2021, Sustainability.
[36] Azana Hafizah Mohd Aman,et al. Internet of Things and Its Applications: A Comprehensive Survey , 2020, Symmetry.
[37] Ravi Kishore Kodali,et al. Fuzzy controlled scalar multiplication for ECC , 2013, IEEE 2013 Tencon - Spring.
[38] Thomas Ledoux,et al. Investigating Energy Consumption and Performance Trade-Off for Interactive Cloud Application , 2017, IEEE Transactions on Sustainable Computing.