1. Trang chủ
  2. » Luận Văn - Báo Cáo

Authentication protocol for resource constrained devices in the internet of things

125 24 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 125
Dung lượng 2,67 MB

Nội dung

Ngày đăng: 27/01/2021, 11:12

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[2] Daniela Maresch and Johannes Gartner. Make disruptive technological change happen-the case of additive manufacturing. Technological Forecasting and So- cial Change, 2018 Sách, tạp chí
Tiêu đề: Technological Forecasting and So-cial Change
[3] Emmanouil Vasilomanolakis, J¨org Daubert, Manisha Luthra, Vangelis Gazis, Alex Wiesmaier, and Panayotis Kikiras. On the security and privacy of internet of things architectures and systems. In 2015 International Workshop on Secure Internet of Things (SIoT), pages 49–57. IEEE, 2015 Sách, tạp chí
Tiêu đề: 2015 International Workshop on SecureInternet of Things (SIoT)
[4] Luigi Atzori, Antonio Iera, and Giacomo Morabito. The internet of things: A survey. Computer networks, 54(15):2787–2805, 2010 Sách, tạp chí
Tiêu đề: Computer networks
[5] Carlo Maria Medaglia and Alexandru Serbanati. An overview of privacy and security issues in the internet of things. In The internet of things, pages 389–395. Springer, 2010 Sách, tạp chí
Tiêu đề: The internet of things
[6] Xiaolin Jia, Quanyuan Feng, Taihua Fan, and Quanshui Lei. Rfid technology and its applications in internet of things (iot). In 2012 2nd international conference on consumer electronics, communications and networks (CECNet), pages 1282–1285. IEEE, 2012 Sách, tạp chí
Tiêu đề: 2012 2nd international conferenceon consumer electronics, communications and networks (CECNet)
[7] Ruth Ande, Bamidele Adebisi, Mohammad Hammoudeh, and Jibran Saleem.Internet of things: Evolution and technologies from a security perspective. Sus- tainable Cities and Society, 2019 Sách, tạp chí
Tiêu đề: Sus-tainable Cities and Society
[8] Yuqiuge Hao and Petri Helo. The role of wearable devices in meeting the needs of cloud manufacturing: A case study. Robotics and Computer-Integrated Man- ufacturing, 45:168–179, 2017 Sách, tạp chí
Tiêu đề: Robotics and Computer-Integrated Man-ufacturing
[11] Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Dong In Kim, and Zhu Han. Data collection and wireless communication in internet of things (iot) using economic analysis and pricing models: A survey. IEEE Communica- tions Surveys & Tutorials, 18(4):2546–2590, 2016 Sách, tạp chí
Tiêu đề: IEEE Communica-tions Surveys & Tutorials
[12] Rodrigo Roman, Javier Lopez, and Masahiro Mambo. Mobile edge comput- ing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78:680–698, 2018 Sách, tạp chí
Tiêu đề: FutureGeneration Computer Systems
[13] Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. Fog comput- ing and its role in the internet of things. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pages 13–16. ACM, 2012 Sách, tạp chí
Tiêu đề: Proceedings of the first edition of theMCC workshop on Mobile cloud computing
[14] Vivek Kumar Sehgal, Anubhav Patrick, Ashutosh Soni, and Lucky Rajput.Smart human security framework using internet of things, cloud and fog com- puting. In Intelligent distributed computing, pages 251–263. Springer, 2015 Sách, tạp chí
Tiêu đề: Intelligent distributed computing
[15] Ikram Ud Din, Mohsen Guizani, Suhaidi Hassan, Byung-Seo Kim, Muham- mad Khurram Khan, Mohammed Atiquzzaman, and Syed Hassan Ahmed. The internet of things: A review of enabled technologies and future challenges. IEEE Access, 7:7606–7640, 2018 Sách, tạp chí
Tiêu đề: IEEEAccess
[16] Jianbing Ni, Kuan Zhang, Xiaodong Lin, and Xuemin Sherman Shen. Secur- ing fog computing for internet of things applications: Challenges and solutions.IEEE Communications Surveys & Tutorials, 20(1):601–628, 2017 Sách, tạp chí
Tiêu đề: IEEE Communications Surveys & Tutorials
[17] Zeeshan Ali Khan. Using energy-efficient trust management to protect iot net- works for smart cities. Sustainable cities and society, 40:1–15, 2018 Sách, tạp chí
Tiêu đề: Sustainable cities and society
[18] Rawan Alkurd, Raed M Shubair, and Ibrahim Abualhaol. Survey on device- to-device communications: Challenges and design issues. In 2014 IEEE 12th International New Circuits and Systems Conference (NEWCAS), pages 361–364.IEEE, 2014 Sách, tạp chí
Tiêu đề: 2014 IEEE 12thInternational New Circuits and Systems Conference (NEWCAS)
[19] Kim Khanh Tran, Minh Khue Pham, and Tran Khanh Dang. A light-weight tightening authentication scheme for the objects’ encounters in the meetings. In International Conference on Future Data and Security Engineering, pages 83–102. Springer, 2018 Sách, tạp chí
Tiêu đề: International Conference on Future Data and Security Engineering
[1] L. Columbus. Roundup of internet of things forecasts and market es- timates. https://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016. Accessed: 2018-Nov- 10 Link
[9] Everything you need to know about iot applications.https://www.simplilearn.com/iot-applications-article. Accessed: 2019-Nov-30 Link
[10] Internet of things applications area – iot applications market.https://iotworm.com/internet-of-things-applications-area/. Accessed: 2019- Nov-30 Link
[22] Introduction to public-key cryptography. https://access.redhat.com/documentation/en-US/Red_Hat_Certificate_System_Common_Criteria_Certification/8.1/html/Deploy-_and_Install_Guide/Introduction_to_Public_Key_Cryptography.html.Ac-cessed: 2019-Nov-30 Link

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w