Читать книгу The New Advanced Society - Группа авторов - Страница 68

References

Оглавление

1. GSMA, IoT Security Guidelines for Endpoint Ecosystems, https://www.gsma.com/iot/iot-security-guidelines-for-endpoint-ecosystem/, Last accessed: 07 Nov 2020.

2. GSMA, IoT Security Guidelines for Network Operators, https://www.gsma.com/iot/iot-security-guidelines-for-network-operators/, Last accessed: 08 Nov 2020.

3. Miessler, D., Securing the internet of things: Mapping attack surface areas using the OWASP IoT top 10, in: RSA Conference, 2015.

4. Andersen, M.P., Kolb, J., Chen, K., Fierro, G., Culler, D.E., Popa, R.A., WAVE: A Decentralized Authorization System for IoT via Blockchain Smart Contracts. Tech. Rep., 2017.

5. Hussein, D., Bertin, E., Frey, V., A Community-Driven Access Control Approach in Distributed IoT Environments. IEEE Commun. Mag., 55, 3, 146–153, 2017.

6. Aman, M.N., Chua, K.C., Sikdar, B., Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J., 4, 5, 1327–1340, 017.

7. Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.G., Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst., 78, 943–955, 2018.

8. Gong, B., Zhang, Y., Wang, Y., A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener. Comput. Syst., 78, 867–886, 2018.

9. Roychoudhury, P., Roychoudhury, B., Saikia, D.K., Provably secure group authentication and key agreement for machine type communication using Chebyshev’s polynomial. Comput. Commun., 127, 146–157, 2018.

10. Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A., Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur., 78, 126–142, 2018.

11. Feng, W., Qin, Y., Zhao, S., Feng, D., AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw., 134, 167–182, 2018.

12. Gope, P. and Sikdar, B., Lightweight and privacy-preserving two factor authentication scheme for IoT devices. IEEE Internet Things J., 6, 580–589, 2019.

13. Cha, S.C., Chen, J.F. et al., A blockchain connected gateway for BLE-based devices in the Internet of Things. IEEE Access, 6, 24639–24649, 2018.

14. Xiong, Z., Zhang, Y. et al., When mobile blockchain meets edge computing. IEEE Commun. Mag., 56, 8, 33–39, 2018.

15. Li, R., Song, T. et al., Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput., 12, 5, 762–771, 2018.

16. Sharma, P.K., Chen, M., Park, J.H., A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access, 6, 115–124, 2018.

17. Manzoor, A., Liyanage, M. et al., Blockchain based proxy re-encryption scheme for secure IoT data sharing, in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 99–103, May 2019.

18. Lu, Y. and Li, J., A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst., 62, 140–147, 2016.

19. Kim, S.K., Kim, U.M. et al., A study on improvement of blockchain application to overcome vulnerability of IoT multiplatform security. Energies, 12, 3, 402, 2019.

20. Huh, J.H. and Seo, K., Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing. J. Supercomput., 75, 6, 3123–3139, 2019.

21. Liu, H.C., Lin, Q., Wen, S., Blockchain-enabled Data Collection and Sharing for Industrial IoT with Deep Reinforcement Learning. IEEE Trans. Industr. Inform., 15, 3516–3526, 2018.

22. Hammi, B., Khatoun, R., Zeadally, S., Fayad, A., Khoukhi, L., IoT technologies for smart cities. IET Netw., 7, 1–13, 2017.

23. Baker, T., Asim, M., MacDermott, A. et al., A secure fog-based platform for SCADA-based IoT critical infrastructure. Software Pract. Exp., 2019.

24. Goyal, T.K. and Sahula, V., Lightweight security algorithm for low power IoT devices, in: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1725–1729, 2016.

*Corresponding author: skpanda00007@gmail.com

The New Advanced Society

Подняться наверх