4.6 Article

Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information

Hayate Takase et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)

Review Computer Science, Hardware & Architecture

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT

Jayasree Sengupta et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Hardware & Architecture

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment

Mohammad Wazid et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Mohammed Ali Al-Garadi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

Rabia Khan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Information Systems

A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks

Named Haddad Pajouh et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2019)

Article Computer Science, Theory & Methods

Secure Key Agreement and Key Protection for Mobile Device User Authentication

Libing Wu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved

Wei Zhou et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Autonomous Cars: Research Results, Issues, and Future Challenges

Rasheed Hussain et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Theory & Methods

Design of secure key management and user authentication scheme for fog computing services

Mohammad Wazid et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions

Mohammad Wazid et al.

PERVASIVE AND MOBILE COMPUTING (2019)

Article Computer Science, Theory & Methods

Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme

Arezou Ostad-Sharif et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

An Edge-to-Cloud Virtualized Multimedia Service Platform for 5G Networks

Federico Alvarez et al.

IEEE TRANSACTIONS ON BROADCASTING (2019)

Article Computer Science, Information Systems

LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm

Prosanta Gope

COMPUTERS & SECURITY (2019)

Article Engineering, Electrical & Electronic

RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment

Mohammad Wazid et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Computer Science, Information Systems

EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices

Tao Lei et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

Efficient and privacy preserving access control scheme for fog-enabled IoT

Kai Fan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

Current research on Internet of Things (IoT) security: A survey

Mardiana Binti Mohamad Noor et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Hardware & Architecture

A survey on internet of things security from data perspectives

Jianwei Hou et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Hardware & Architecture

Authentication in cloud-driven IoT-based big data environment: Survey and outlook

Mohammad Wazid et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2019)

Proceedings Paper Computer Science, Theory & Methods

EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques

Ayush Kumar et al.

2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

SmartCrowd: Decentralized and Automated Incentives for Distributed IoT System Detection

Bo Wu et al.

2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) (2019)

Article Computer Science, Information Systems

A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features

Rajesh Kumar et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Internet-of-Things (IoT)-Based Smart Agriculture: Toward Making the Fields Talk

Muhammad Ayaz et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

E-Spion: A System-Level Intrusion Detection System for IoT Devices

Anand Mudgerikar et al.

PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19) (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

IoT Malware Analysis

Victor Clincyl et al.

2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1 (2019)

Article Computer Science, Information Systems

BRIoT: Behavior Rune Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems

Vishal Sharma et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment

Ashok Kumar Das et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

IoMT Malware Detection Approaches: Analysis and Research Challenges

Mohammad Wazid et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Toward a Lightweight Intrusion Detection System for the Internet of Things

Sana Ullah Jan et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT

Sheng Ding et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Sensitive and Energetic IoT Access Control for Managing Cloud Electronic Health Records

Khaled Riad et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

Vikas Hassija et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning

Amin Azmoodeh et al.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2019)

Article Computer Science, Information Systems

5G-Based Smart Healthcare Network: Architecture, Taxonomy, Challenges and Future Research Directions

Abdul Ahad et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks

Dheerendra Mishra et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Review Computer Science, Theory & Methods

IoT security: Review, blockchain solutions, and open challenges

Minhaj Ahmad Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Taxonomy and analysis of security protocols for Internet of Things

Ashok Kumar Das et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks

Syed Ahsan Raza Naqvi et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Information Systems

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services

Debiao He et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Information Systems

On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices

Ding Wang et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Information Systems

Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

Ming Luo et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment

Mohammad Wazid et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2018)

Article Computer Science, Information Systems

Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Hardware & Architecture

Authentication Protocols for Implantable Medical Devices Taxonomy, analysis, and future directions

Sravani Challa et al.

IEEE CONSUMER ELECTRONICS MAGAZINE (2018)

Article Computer Science, Hardware & Architecture

Softwarization and virtualization in 5G mobile networks: Benefits, trends and challenges

Massimo Condoluci et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Hardware & Architecture

Reconfigurable Security: Edge-Computing-Based Framework for IoT

Ruei-Hau Hsu et al.

IEEE NETWORK (2018)

Article Computer Science, Hardware & Architecture

Authenticated key management protocol for cloud-assisted body area sensor networks

Mohammad Wazid et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Ashok Kumar Das et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Telecommunications

A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks

Mohammad Wazid et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

UAV-Based IoT Platform: A Crowd Surveillance Use Case

Naser Hossein Motlagh et al.

IEEE COMMUNICATIONS MAGAZINE (2017)

Article Engineering, Electrical & Electronic

5G: A Tutorial Overview of Standards, Trials, Challenges, Deployment, and Practice

Mansoor Shafi et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)

Article Automation & Control Systems

Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Review Computer Science, Hardware & Architecture

A survey on green communication and security challenges in 5G wireless communication networks

Pimmy Gandotra et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

Fan Wu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Review Computer Science, Information Systems

Authentication Protocols for Internet of Things: A Comprehensive Survey

Mohamed Amine Ferrag et al.

SECURITY AND COMMUNICATION NETWORKS (2017)

Article Computer Science, Information Systems

LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context

Qixu Wang et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

Sravani Challa et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

Pengfei Hu et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

Software-Defined Networking for Internet of Things: A Survey

Samaresh Bera et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Review Computer Science, Information Systems

A Survey on Security and Privacy Issues in Internet-of-Things

Yuchen Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Proceedings Paper Telecommunications

The Mirai Botnet and the IoT Zombie Armies

Georgios Kambourakis et al.

MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: a review

Syrine Sahmim et al.

KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (2017)

Article Computer Science, Hardware & Architecture

DDoS in the IoT: Mirai and Other Botnets

Constantinos Kolias et al.

COMPUTER (2017)

Article Computer Science, Information Systems

Intelligent Intrusion Detection in Low-Power IoTs

Ahmed Saeed et al.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2016)

Article Computer Science, Information Systems

Practical access control for sensor networks in the context of the Internet of Things

Fagen Li et al.

COMPUTER COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments

Pardeep Kumar et al.

IEEE SENSORS JOURNAL (2016)

Article Computer Science, Hardware & Architecture

ECONOMICS OF INTERNET OF THINGS: AN INFORMATION MARKET APPROACH

Dusit Niyato et al.

IEEE WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Information Systems

Provably secure biometric-based user authentication and key agreement scheme in cloud computing

Mohammad Wazid et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

Design of sinkhole node detection mechanism for hierarchical wireless sensor networks

Mohammad Wazid et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Telecommunications

An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks

Mohammad Wazid et al.

WIRELESS PERSONAL COMMUNICATIONS (2016)

Article Computer Science, Information Systems

Internet of Drones

Mirmojtaba Gharibi et al.

IEEE ACCESS (2016)

Article Computer Science, Information Systems

eDAAAS: Efficient distributed anonymous authentication and access in smart homes

An Braeken et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)

Article Computer Science, Hardware & Architecture

The Ethical Impact of the Internet of Things in Social Relationships Technological mediation on mutual trust

Guiou Kobayashi et al.

IEEE CONSUMER ELECTRONICS MAGAZINE (2016)

Article Computer Science, Information Systems

Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues

Jorge Granjal et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Information Systems

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Theory & Methods

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Jia Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

A Survey of Intrusion Detection Systems in Wireless Sensor Networks

Ismail Butun et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Engineering, Electrical & Electronic

Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices

Debiao He et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)

Article Engineering, Civil

Generation of a Precise Roadway Map for Autonomous Cars

Kichun Jo et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2014)

Article Computer Science, Theory & Methods

Secure Deduplication with Efficient and Reliable Convergent Key Management

Jin Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

uCloud: a user-centric key management scheme for cloud data protection

Yung-Wei Kao et al.

IET INFORMATION SECURITY (2013)

Article Computer Science, Information Systems

Hybrid Attribute- and Re-Encryption-Based Key Management for Secure and Scalable Mobile Applications in Clouds

Piotr K. Tysowski et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2013)

Article Computer Science, Information Systems

An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network

Wenmin Li et al.

COMPUTER COMMUNICATIONS (2012)

Article Computer Science, Information Systems

A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks

Ashok Kumar Das

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2012)

Article Computer Science, Information Systems

SPINS: Security protocols for sensor networks

A Perrig et al.

WIRELESS NETWORKS (2002)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)