4.4 Article

GDPR Compliance IoT Authentication Model for Smart Home Environment

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A secure authentication scheme for IoT application in smart home

Pankaj Kumar et al.

Summary: This study proposed a smart card-based secure addressing and authentication scheme for IoT devices by modifying the standard IPv6 protocol, providing unique addressing and authentication methods with secret session keys to prevent unauthorized access. Security analysis demonstrates the effectiveness of the scheme in protecting smart home IoT networks from various vulnerabilities and attacks.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Automation & Control Systems

The Mesh Tools Package - Introducing Annotated 3D Triangle Maps in ROS

Sebastian Puetz et al.

Summary: The Mesh Tools package introduces message definitions, RViz plugins, tools, and a persistence layer to support triangle mesh maps in ROS. The proposed plugins and tools enable easy publishing, editing, and inspection of annotated triangle maps in ROS. These tools efficiently visualize and validate the complete layered map and associated properties.

ROBOTICS AND AUTONOMOUS SYSTEMS (2021)

Article Automation & Control Systems

Secure and Energy Efficient Data Transmission Model for WSN

Anuj Kumar Singh et al.

Summary: This research discusses the introduction of an authentication mechanism in wireless sensor networks to address potential security issues. A more energy-efficient and efficient security model is proposed, choosing the optimal energy-efficient cryptography algorithm to protect data.

INTELLIGENT AUTOMATION AND SOFT COMPUTING (2021)

Article Engineering, Electrical & Electronic

Simple and secure device authentication mechanism for smart environments using Internet of things devices

Muzzammil Hussain et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)

Article Computer Science, Information Systems

Enterprise API Security and GDPR Compliance: Design and Implementation Perspective

Fatima Hussain et al.

IT PROFESSIONAL (2020)

Article Computer Science, Information Systems

Secure and anonymous authentication scheme for the Internet of Things with pairing

Hsiao-Ling Wu et al.

Pervasive and Mobile Computing (2020)

Article Computer Science, Information Systems

Enabling the Secure Use of Dynamic Identity for the Internet of Things-Using the Secure Remote Update Protocol (SRUP)

Andrew John Poulter et al.

FUTURE INTERNET (2020)

Article Chemistry, Analytical

A Survey of Internet of Things (IoT) Authentication Schemes

Mohammed El-hajj et al.

SENSORS (2019)

Article Computer Science, Information Systems

Anonymous authentication scheme for smart home environment with provable security

Mengxia Shuai et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things

Binbin Yu et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)

Article Law

The European Union general data protection regulation: what it is and what it means

Chris Jay Hoofnagle et al.

INFORMATION & COMMUNICATIONS TECHNOLOGY LAW (2019)

Article Computer Science, Information Systems

Remotely Access My Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme

Qiuyun Lyu et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks

Ugur Coruh et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Law

EU General Data Protection Regulation: Changes and implications for personal data collecting companies

Christina Tikkinen-Piri et al.

COMPUTER LAW & SECURITY REVIEW (2018)

Article Computer Science, Information Systems

Notes on Secure authentication scheme for IoT and cloud servers

Chin-Chen Chang et al.

PERVASIVE AND MOBILE COMPUTING (2017)

Article Computer Science, Information Systems

A secure authentication scheme for Internet of Things

King-Hang Wang et al.

PERVASIVE AND MOBILE COMPUTING (2017)

Article Computer Science, Information Systems

Secure authentication scheme for IoT and cloud servers

Sheetal Kalra et al.

PERVASIVE AND MOBILE COMPUTING (2015)

Article Computer Science, Information Systems

A security authentication scheme in machine-to-machine home network service

Xuebin Sun et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Hardware & Architecture

The Internet of Things: A survey

Luigi Atzori et al.

COMPUTER NETWORKS (2010)