4.6 Article

A decentralized lightweight blockchain-based authentication mechanism for IoT systems

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

A secure fog-based platform for SCADA-based IoT critical infrastructure

Thar Baker et al.

SOFTWARE-PRACTICE & EXPERIENCE (2020)

Article Automation & Control Systems

A Profitable and Energy-Efficient Cooperative Fog Solution for IoT Services

Ismaeel Al Ridhawi et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment

Alireza Esfahani et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices

Prosanta Gope et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Data and Service Management in Densely Crowded Environments: Challenges, Opportunities, and Recent Developments

Moayad Aloqaily et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Chemistry, Analytical

A Blockchain Framework for Securing Connected and Autonomous Vehicles

Geetanjali Rathee et al.

SENSORS (2019)

Article Computer Science, Information Systems

TrustChain: A Privacy Preserving Blockchain with Edge Computing

Upul Jayasinghe et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)

Article Computer Science, Information Systems

Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics

Gulshan Kumar et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Incentivizing Consensus Propagation in Proof-of-Stake Based Consortium Blockchain Networks

Jiawen Kang et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Review Computer Science, Information Systems

A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond

Mingli Wu et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

REAL-TIME ROUTE PLANNING AND DATA DISSEMINATION FOR URBAN SCENARIOS USING THE INTERNET OF THINGS

Awais Ahmad et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Connected and Autonomous Electric Vehicles (CAEVs)

Ala Abu Alkheir et al.

IT Professional (2019)

Article Telecommunications

A Mechanism for Securing IoT-enabled Applications at the Fog Layer

Nadeem Abbas et al.

JOURNAL OF SENSOR AND ACTUATOR NETWORKS (2019)

Proceedings Paper Computer Science, Theory & Methods

IOT Security Issues Via Blockchain: A Review Paper

Abid Sultan et al.

2019 INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2019) (2019)

Article Computer Science, Information Systems

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Vikas Hassija et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Provably secure group authentication and key agreement for machine type communication using Chebyshev's polynomial

Probidita Roychoudhury et al.

COMPUTER COMMUNICATIONS (2018)

Article Computer Science, Hardware & Architecture

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS

Wei Feng et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Information Systems

Bubbles of Trust: A decentralized blockchain-based authentication system for IoT

Mohamed Tahar Hammi et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems

Samet Tonyali et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A remote attestation mechanism for the sensing layer nodes of the Internet of Things

Bei Gong et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks

P. Vijayakumar et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Automation & Control Systems

Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption

Khan Muhammad et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Construction & Building Technology

Provably secure pseudo-identity based device authentication for smart cities environment

Alavalapati Goutham Reddy et al.

SUSTAINABLE CITIES AND SOCIETY (2018)

Article Chemistry, Analytical

Performance Analysis of Latency-Aware Data Management in Industrial IoT Networks

Theofanis P. Raptis et al.

SENSORS (2018)

Proceedings Paper Computer Science, Theory & Methods

A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform

Joao Sousa et al.

2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN) (2018)

Article Computer Science, Hardware & Architecture

An energy-aware service composition algorithm for multiple cloud-based IoT applications

Thar Baker et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Communication

Blockchain's roles in strengthening cybersecurity and protecting privacy

Nir Kshetri

TELECOMMUNICATIONS POLICY (2017)

Article Computer Science, Information Systems

Mutual Authentication in IoT Systems Using Physical Unclonable Functions

Muhammad Naveed Aman et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Blockchain based Data Integrity Service Framework for IoT data

Bin Liu et al.

2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017) (2017)

Article Computer Science, Hardware & Architecture

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server

Fan Wu et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Theory & Methods

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud

Xuyun Zhang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

On the features and challenges of security and privacy in distributed internet of things

Rodrigo Roman et al.

COMPUTER NETWORKS (2013)

Article Engineering, Electrical & Electronic

Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things

Fagen Li et al.

IEEE SENSORS JOURNAL (2013)