相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
Mohammad Wazid et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information
Hayate Takase et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT
Jayasree Sengupta et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Mohammad Wazid et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Mohammed Ali Al-Garadi et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Rabia Khan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges
Sumit Pundir et al.
IEEE ACCESS (2020)
A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
Named Haddad Pajouh et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2019)
Secure Key Agreement and Key Protection for Mobile Device User Authentication
Libing Wu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved
Wei Zhou et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Autonomous Cars: Research Results, Issues, and Future Challenges
Rasheed Hussain et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Design of secure key management and user authentication scheme for fog computing services
Mohammad Wazid et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions
Mohammad Wazid et al.
PERVASIVE AND MOBILE COMPUTING (2019)
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
Arezou Ostad-Sharif et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
Mohammad Wazid et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
An Edge-to-Cloud Virtualized Multimedia Service Platform for 5G Networks
Federico Alvarez et al.
IEEE TRANSACTIONS ON BROADCASTING (2019)
LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm
Prosanta Gope
COMPUTERS & SECURITY (2019)
Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs
K. Selvakumar et al.
INFORMATION SCIENCES (2019)
RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment
Mohammad Wazid et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices
Tao Lei et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Efficient and privacy preserving access control scheme for fog-enabled IoT
Kai Fan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
Mohammad Wazid et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Current research on Internet of Things (IoT) security: A survey
Mardiana Binti Mohamad Noor et al.
COMPUTER NETWORKS (2019)
A survey on internet of things security from data perspectives
Jianwei Hou et al.
COMPUTER NETWORKS (2019)
Authentication in cloud-driven IoT-based big data environment: Survey and outlook
Mohammad Wazid et al.
JOURNAL OF SYSTEMS ARCHITECTURE (2019)
EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques
Ayush Kumar et al.
2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT) (2019)
SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection
Bo Wu et al.
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) (2019)
A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features
Rajesh Kumar et al.
IEEE ACCESS (2019)
Internet-of-Things (IoT)-Based Smart Agriculture: Toward Making the Fields Talk
Muhammad Ayaz et al.
IEEE ACCESS (2019)
Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks
An Braeken et al.
IEEE ACCESS (2019)
E-Spion: A System-Level Intrusion Detection System for IoT Devices
Anand Mudgerikar et al.
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)
IoT Malware Analysis
Victor Clincyl et al.
2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1 (2019)
BRIoT: Behavior Rune Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems
Vishal Sharma et al.
IEEE ACCESS (2019)
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
Ashok Kumar Das et al.
IEEE ACCESS (2019)
IoMT Malware Detection Approaches: Analysis and Research Challenges
Mohammad Wazid et al.
IEEE ACCESS (2019)
Toward a Lightweight Intrusion Detection System for the Internet of Things
Sana Ullah Jan et al.
IEEE ACCESS (2019)
A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT
Sheng Ding et al.
IEEE ACCESS (2019)
A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation
Hongsong Chen et al.
IEEE ACCESS (2019)
Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records
Khaled Riad et al.
IEEE ACCESS (2019)
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
Vikas Hassija et al.
IEEE ACCESS (2019)
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
Amin Azmoodeh et al.
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2019)
5G-Based Smart Healthcare Network: Architecture, Taxonomy, Challenges and Future Research Directions
Abdul Ahad et al.
IEEE ACCESS (2019)
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks
Dheerendra Mishra et al.
MULTIMEDIA TOOLS AND APPLICATIONS (2018)
IoT security: Review, blockchain solutions, and open challenges
Minhaj Ahmad Khan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Taxonomy and analysis of security protocols for Internet of Things
Ashok Kumar Das et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks
Syed Ahsan Raza Naqvi et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
Debiao He et al.
IEEE SYSTEMS JOURNAL (2018)
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices
Ding Wang et al.
IEEE SYSTEMS JOURNAL (2018)
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
Ming Luo et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment
Mohammad Wazid et al.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2018)
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
Mohammad Wazid et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Authentication Protocols for Implantable Medical Devices Taxonomy, analysis, and future directions
Sravani Challa et al.
IEEE CONSUMER ELECTRONICS MAGAZINE (2018)
Softwarization and virtualization in 5G mobile networks: Benefits, trends and challenges
Massimo Condoluci et al.
COMPUTER NETWORKS (2018)
Reconfigurable Security: Edge-Computing-Based Framework for IoT
Ruei-Hau Hsu et al.
IEEE NETWORK (2018)
Authenticated key management protocol for cloud-assisted body area sensor networks
Mohammad Wazid et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
Ashok Kumar Das et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks
Mohammad Wazid et al.
WIRELESS PERSONAL COMMUNICATIONS (2017)
UAV-Based IoT Platform: A Crowd Surveillance Use Case
Naser Hossein Motlagh et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice
Mansoor Shafi et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)
Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment
Mohammad Wazid et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
A survey on green communication and security challenges in 5G wireless communication networks
Pimmy Gandotra et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
Fan Wu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Authentication Protocols for Internet of Things: A Comprehensive Survey
Mohamed Amine Ferrag et al.
SECURITY AND COMMUNICATION NETWORKS (2017)
LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context
Qixu Wang et al.
IEEE ACCESS (2017)
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
Sravani Challa et al.
IEEE ACCESS (2017)
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
Pengfei Hu et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
Software-Defined Networking for Internet of Things: A Survey
Samaresh Bera et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
A Survey on Security and Privacy Issues in Internet-of-Things
Yuchen Yang et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
The Mirai Botnet and the IoT Zombie Armies
Georgios Kambourakis et al.
MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) (2017)
Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review
Syrine Sahmim et al.
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (2017)
DDoS in the IoT: Mirai and Other Botnets
Constantinos Kolias et al.
COMPUTER (2017)
Intelligent Intrusion Detection in Low-Power IoTs
Ahmed Saeed et al.
ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2016)
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
Mohammad Sabzinejad Farash et al.
AD HOC NETWORKS (2016)
Practical access control for sensor networks in the context of the Internet of Things
Fagen Li et al.
COMPUTER COMMUNICATIONS (2016)
Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments
Pardeep Kumar et al.
IEEE SENSORS JOURNAL (2016)
ECONOMICS OF INTERNET OF THINGS: AN INFORMATION MARKET APPROACH
Dusit Niyato et al.
IEEE WIRELESS COMMUNICATIONS (2016)
Provably secure biometric-based user authentication and key agreement scheme in cloud computing
Mohammad Wazid et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
Mohammad Wazid et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks
Mohammad Wazid et al.
WIRELESS PERSONAL COMMUNICATIONS (2016)
Internet of Drones
Mirmojtaba Gharibi et al.
IEEE ACCESS (2016)
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
An Braeken et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)
The Ethical Impact of the Internet of Things in Social Relationships Technological mediation on mutual trust
Guiou Kobayashi et al.
IEEE CONSUMER ELECTRONICS MAGAZINE (2016)
Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
Jorge Granjal et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
Ala Al-Fuqaha et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)
Enabling Cloud Storage Auditing With Key-Exposure Resistance
Jia Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
Pawani Porambage et al.
IEEE ACCESS (2015)
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
Muhamed Turkanovic et al.
AD HOC NETWORKS (2014)
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Ismail Butun et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices
Debiao He et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)
Generation of a Precise Roadway Map for Autonomous Cars
Kichun Jo et al.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2014)
Secure Deduplication with Efficient and Reliable Convergent Key Management
Jin Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
uCloud: a user-centric key management scheme for cloud data protection
Yung-Wei Kao et al.
IET INFORMATION SECURITY (2013)
Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds
Piotr K. Tysowski et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2013)
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network
Wenmin Li et al.
COMPUTER COMMUNICATIONS (2012)
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
Ashok Kumar Das
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2012)
Secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
Chun-Ta Li et al.
COMPUTER COMMUNICATIONS (2008)
SPINS: Security protocols for sensor networks
A Perrig et al.
WIRELESS NETWORKS (2002)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)