4.7 Article

Secure ticket-based authentication method for IoT applications

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Privacy-Aware Data Fusion and Prediction With Spatial-Temporal Context for Smart City Industrial Environment

Lianyong Qi et al.

Summary: Smart cities generate a significant amount of industrial data related to transportation, healthcare, business, and social activities. Protecting user privacy, especially in terms of spatial-temporal context information, is crucial when integrating and analyzing this data. A novel privacy-aware data fusion and prediction approach based on locality-sensitive hashing technique is proposed in this article, showing better prediction performances compared to other methods through real-world dataset experiments.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

Security-Aware Dynamic Scheduling for Real-Time Optimization in Cloud-Based Industrial Applications

Shunmei Meng et al.

Summary: This article proposes a security-aware dynamic scheduling method for real-time resource allocation in ICS. A three-level security model is designed for tasks and cloud resources in ICS, and a two-tier heterogeneous cloud architecture is introduced. A security-aware scheduling method based on distributed particle swarm optimization is presented for resource allocation, with a dynamic scheduling mechanism based on dynamic workflow model to address the dynamics of edge resources and mobile industrial applications.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Editorial Material Automation & Control Systems

Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities

K. -K. R. Choo et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks

Prosanta Gope et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Review Computer Science, Hardware & Architecture

Authentication in mobile cloud computing: A survey

Mojtaba Alizadeh et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Hardware & Architecture

Security, privacy and trust in Internet of Things: The road ahead

S. Sicari et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Information Systems

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Debiao He et al.

IEEE SYSTEMS JOURNAL (2015)

Article Computer Science, Information Systems

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography

Shehzad Ashraf Ch et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Information Systems

Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks

Wen-Bin Hsieh et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2014)

Article Computer Science, Hardware & Architecture

On the features and challenges of security and privacy in distributed internet of things

Rodrigo Roman et al.

COMPUTER NETWORKS (2013)

Article Computer Science, Information Systems

Internet of things: Vision, applications and research challenges

Daniele Miorandi et al.

AD HOC NETWORKS (2012)

Article Computer Science, Hardware & Architecture

The Internet of Things: A survey

Luigi Atzori et al.

COMPUTER NETWORKS (2010)

Article Computer Science, Hardware & Architecture

A proof of revised Yahalom protocol in the Bellare and Rogaway (1993) model

Kim-Kwang Raymond Choo

COMPUTER JOURNAL (2007)