3.8 Proceedings Paper

Secure Data Transmission with Access Control for Smart Home Devices

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks

Liang Zhao et al.

Summary: POLAR is an adaptive routing scheme based on online learning that dynamically selects routing strategies for specific traffic scenarios by utilizing the computational power of edge servers and learning network traffic patterns. By dividing large geographical areas into grids using Geohash, POLAR facilitates real-time traffic data collection and processing for regional management in the controller. The scheme also incorporates a new Penicillium Reproduction Algorithm (PRA) to enhance the learning effectiveness of Online Sequential Extreme Learning Machine (OS-ELM), ultimately deployed in the control plane to generate decision-making models (routing policies) and choose optimal routing strategies based on real-time data. Extensive simulations demonstrate that POLAR outperforms traditional routing protocols in packet delivery ratio and latency.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Secure Lightweight Stream Data Outsourcing for Internet of Things

Su Peng et al.

Summary: The proposed framework for IoT, based on identity and blockchain technologies, ensures the integrity of data and privacy protection, suitable for lightweight devices and practical for implementation in IoT systems.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment

Geong Sen Poh et al.

Summary: A smart home provides convenience and security for users, but concerns exist around security and privacy due to the potential leakage and unauthorized access of sensitive information. A proposed privacy-preserving scheme, PrivHome, aims to address these issues by ensuring data confidentiality, authentication, and privacy-preserving queries within smart home systems. The scheme utilizes symmetric cryptographic techniques for efficiency and effectiveness, demonstrating its practicality through experimental and simulation results.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Theory & Methods

IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT

Hongyang Yan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

ACE with Compact Ciphertext Size and Decentralized Sanitizers

Zhongyuan Yao et al.

INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE (2019)

Article Computer Science, Information Systems

Smart Homes: Undeniable Reality or Always Just around the Corner?

A. J. Brush et al.

IEEE PERVASIVE COMPUTING (2018)

Article Automation & Control Systems

SDN-Enabled Multi-Attribute-Based Secure Communication for Smart Grid in IIoT Environment

Rajat Chaudhary et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Access control encryption with efficient verifiable sanitized decryption

Huige Wang et al.

INFORMATION SCIENCES (2018)

Proceedings Paper Computer Science, Hardware & Architecture

Towards Secure Smart Home IoT: Manufacturer and User Network Access Control Framework

Mohammed Al-Shaboti et al.

PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2018)

Article Computer Science, Information Systems

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He et al.

IEEE SYSTEMS JOURNAL (2017)

Article Engineering, Electrical & Electronic

Privacy-Preserving Data Analytics in Cloud-Based Smart Home with Community Hierarchy

Ying-Tsung Lee et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2017)

Article Computer Science, Theory & Methods

Anonymous Secure Framework in Connected Smart Home Environments

Pardeep Kumar et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Review Green & Sustainable Science & Technology

A review of Internet of Things for smart home: Challenges and solutions

Biljana L. Risteska Stojkoska et al.

JOURNAL OF CLEANER PRODUCTION (2017)

Article Computer Science, Information Systems

A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes

Tianyi Song et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Proceedings Paper Computer Science, Theory & Methods

Access Control Encryption for General Policies from Standard Assumptions

Sam Kim et al.

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I (2017)

Proceedings Paper Computer Science, Theory & Methods

Strengthening Access Control Encryption

Christian Badertscher et al.

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I (2017)

Proceedings Paper Computer Science, Theory & Methods

Access Control Encryption for Equality, Comparison, and More

Georg Fuchsbauer et al.

PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II (2017)

Article Engineering, Electrical & Electronic

Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments

Pardeep Kumar et al.

IEEE SENSORS JOURNAL (2016)

Article Engineering, Electrical & Electronic

An integrated cloud-based smart home management system with community hierarchy

Ying-tsung Lee et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2016)

Proceedings Paper Computer Science, Information Systems

Access Control Encryption: Enforcing Information Flow with Cryptography

Ivan Damgard et al.

THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II (2016)

Proceedings Paper Computer Science, Theory & Methods

Privacy Preserving Data Analytics for Smart Homes

Antorweep Chakravorty et al.

IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013) (2013)