Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey
暂无分享,去创建一个
Karl Andersson | Ilsun You | Francesco Palmieri | Mubashir Husain Rehmani | Vishal Sharma | Jaedeok Lim | M. H. Rehmani | I. You | F. Palmieri | K. Andersson | Vishal Sharma | Jae-Deok Lim
[1] Maslina Daud,et al. Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework , 2016, ICC 2016.
[2] Rajanpreet Kaur Chahal,et al. Fuzzy Rule-Based Expert System for Determining Trustworthiness of Cloud Service Providers , 2017, Int. J. Fuzzy Syst..
[3] Tarik Taleb,et al. An Accurate Security Game for Low-Resource IoT Devices , 2017, IEEE Transactions on Vehicular Technology.
[4] Guomei Zhang,et al. Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks , 2016, Sensors.
[5] Kunihiko Miyazaki,et al. How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC , 2010, Financial Cryptography Workshops.
[6] Xu Wu,et al. A multi-domain trust management model for supporting RFID applications of IoT , 2017, PloS one.
[7] Muthu Ramachandran,et al. Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..
[8] Hsinchun Chen,et al. Identifying Supervisory Control and Data Acquisition (SCADA) Devices and their Vulnerabilities on the Internet of Things (IoT): A Text Mining Approach , 2018 .
[9] Konstantin Mikhaylov,et al. Evaluation of LoRa LPWAN technology for remote health and wellbeing monitoring , 2016, 2016 10th International Symposium on Medical Information and Communication Technology (ISMICT).
[10] Jongpil Jeong,et al. Security analysis of fast inter-LMA domain handover scheme in proxy mobile IPv6 networks , 2017, Pervasive Mob. Comput..
[11] Vivek Kumar Sehgal,et al. Smart Human Security Framework Using Internet of Things, Cloud and Fog Computing , 2014, ISI.
[12] Riaz A. Khan,et al. Sensor fast proxy mobile IPv6 (SFPMIPv6)-A framework for mobility supported IP-WSN for improving QoS and building IoT , 2014, 2014 International Conference on Communication and Signal Processing.
[13] Alireza Ghasempour. Optimum Packet Service and Arrival Rates in Advanced Metering Infrastructure Architecture of Smart Grid , 2016, 2016 IEEE Green Technologies Conference (GreenTech).
[14] Vicente Hernández Díaz,et al. Cross-Layer and Reliable Opportunistic Routing Algorithm for Mobile Ad Hoc Networks , 2018, IEEE Sensors Journal.
[15] Qiaoyan Wen,et al. An identity-based personal location system with protected privacy in IOT , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[16] A. V. Deshpande,et al. Trust Management Model based on Fuzzy Approach for Ubiquitous Computing , 2016, Int. J. Ambient Comput. Intell..
[17] Yang Gao,et al. Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems , 2018, Comput. Networks.
[18] Thomas Watteyne,et al. Understanding the Limits of LoRaWAN , 2016, IEEE Communications Magazine.
[19] Hao Wang,et al. CASLP: A Confused Arc-Based Source Location Privacy Protection Scheme in WSNs for IoT , 2018, IEEE Communications Magazine.
[20] Yue Yang,et al. Secure MAC Protocol for Periodic Smart Metering Data Communication with Compressive Sensing , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[21] Hung-Yu Chien,et al. Secure fast WLAN handoff using time-bound delegated authentication , 2009, Int. J. Commun. Syst..
[22] Sana Ullah,et al. A Hybrid and Secure Priority-Guaranteed MAC Protocol for Wireless Body Area Network , 2014, Int. J. Distributed Sens. Networks.
[23] Naveen K. Chilamkurti,et al. Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.
[24] Jemal H. Abawajy,et al. Scalable RFID security framework and protocol supporting Internet of Things , 2014, Comput. Networks.
[25] Andrei V. Gurtov,et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[26] Reinoud Joosten,et al. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[27] Roberto Casas,et al. A Network Performance Analysis of LoRa Modulation for LPWAN Sensor Devices , 2016, UCAmI.
[28] Jia Guo,et al. A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems , 2017, 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).
[29] Salim Hariri,et al. IoT Security Development Framework for building trustworthy Smart car services , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[30] Weili Han,et al. A Privacy Preserving Data Aggregation Scheme to Investigate Apps Installment in Massive Mobile Devices , 2017, IIKI.
[31] McDanielPatrick,et al. Program Analysis of Commodity IoT Applications for Security and Privacy , 2019 .
[32] Thiemo Voigt,et al. Lightweight IKEv2: A Key Management Solution for both Compressed IPsec and IEEE 802.15.4 Security , 2012 .
[33] Yu-Hung Huang,et al. A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).
[34] Antonio F. Gómez-Skarmeta,et al. Network-Layer Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[35] Jinquan Zhang,et al. A Location Privacy Preserving Scheme Based on Repartitioning Anonymous Region in Mobile Social Network , 2017, IIKI.
[36] Chun Chen,et al. Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks , 2013, IEEE Transactions on Computers.
[37] Ruhul Amin,et al. Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..
[38] Zhen Li,et al. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks , 2016, Sensors.
[39] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[40] Yuanguo Bi,et al. Software Defined Space-Terrestrial Integrated Networks: Architecture, Challenges, and Solutions , 2018, IEEE Network.
[41] Tai-Myung Chung,et al. ProFiOt: Abnormal Behavior Profiling (ABP) of IoT devices based on a machine learning approach , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[42] Li Xu,et al. Ticket-based handoff authentication for wireless mesh networks , 2014, Comput. Networks.
[43] Gang Sun,et al. The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems , 2017, Cluster Computing.
[44] Yan He,et al. BASH: A backhaul-aided seamless handoff scheme for Wireless Mesh Networks , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[45] Ilsun You,et al. Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing , 2017, IEEE Access.
[46] Pascal Urien. LLCPS: A new security framework based on TLS for NFC P2P applications in the Internet of Things , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).
[47] Gyu Myoung Lee,et al. Autonomic trust management in cloud-based and highly dynamic IoT applications , 2015, 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015).
[48] Jia Liu,et al. K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.
[49] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[50] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[51] Werner Henkel,et al. Secure physical-layer key generation protocol and key encoding in wireless communications , 2010, 2010 IEEE Globecom Workshops.
[52] Jongpil Jeong,et al. An Enhanced Secure Mobility Management Scheme for Building IoT Applications , 2015, FNC/MobiSPC.
[53] Robert J. Hall,et al. An Internet of Drones , 2016, IEEE Internet Computing.
[54] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[55] Mohiuddin Ahmed,et al. Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly Detection , 2014, SecureComm.
[56] Jacob H. Gunther,et al. Finding the optimal number of aggregators in machine-to-machine advanced metering infrastructure architecture of smart grid based on cost, delay, and energy consumption , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[57] Yier Jin,et al. Privacy and Security in Internet of Things and Wearable Devices , 2015, IEEE Transactions on Multi-Scale Computing Systems.
[58] Sajal K. Das,et al. 5G for Ultra-Reliable Low-Latency Communications , 2018, IEEE Netw..
[59] Jia Guo,et al. Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.
[60] Salvatore J. Stolfo,et al. Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[61] Ahmad-Reza Sadeghi,et al. Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[62] Hao Jiang,et al. A Medical Healthcare System for Privacy Protection Based on IoT , 2015, 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP).
[63] Hong-Han Shuai,et al. Eavesdropping prevention for heterogeneous Internet of Things systems , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[64] Shafiz Affendi Mohd Yusof,et al. Timely trust: The use of IoT and cultural effects on swift trust formation within global virtual teams , 2017, 2017 8th International Conference on Information Technology (ICIT).
[65] Yonghun Kim,et al. Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in Infrastructureless Peer-Aware Communications , 2017, IEEE Access.
[66] Soma Bandyopadhyay,et al. Negotiation-based privacy preservation scheme in internet of things platform , 2012, SecurIT '12.
[67] Maria Rita Palattella,et al. Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.
[68] Hannes Tschofenig,et al. Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.
[69] Elias Z. Tragos,et al. RERUM: Building a reliable IoT upon privacy- and security- enabled smart objects , 2014, 2014 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[70] Rongxing Lu,et al. A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications , 2015, IEEE Internet of Things Journal.
[71] Kyungroul Lee,et al. A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT , 2017, Secur. Commun. Networks.
[72] Juan Wang,et al. Enabling Security-Enhanced Attestation With Intel SGX for Remote Terminal and IoT , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[73] Alireza Ghasempour,et al. Optimized advanced metering infrastructure architecture of smart grid based on total cost, energy, and delay , 2016, 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).
[74] Ilsun You,et al. SAT-FLOW: Multi-Strategy Flow Table Management for Software Defined Satellite Networks , 2017, IEEE Access.
[75] Alireza Ghasempour. Optimum number of aggregators based on power consumption, cost, and network lifetime in advanced metering infrastructure architecture for Smart Grid Internet of Things , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[76] Irina Gudkova,et al. Secure and Reliable IoT Networks Using Fog Computing with Software-Defined Networking and Blockchain , 2019, J. Sens. Actuator Networks.
[77] Julien Montavont,et al. Indoor deployment of low-power wide area networks (LPWAN): A LoRaWAN case study , 2016, 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[78] Narendra S. Chaudhari,et al. SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network , 2018, IEEE Access.
[79] Lorenzo Mucchi,et al. The Role of Physical Layer Security in IoT: A Novel Perspective , 2016, Inf..
[80] Alessandro Neri,et al. Security Access Protocols in IoT Capillary Networks , 2017, IEEE Internet of Things Journal.
[81] Imane Aly Saroit,et al. Secure and efficient uniform handover scheme for LTE-A networks , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[82] Roger Piqueras Jover,et al. Connection-less communication of IoT devices over LTE mobile networks , 2015, 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[83] Muzzammil Hussain,et al. A secure AODV routing protocol with node authentication , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).
[84] Albert Y. Zomaya,et al. Big Data Privacy in the Internet of Things Era , 2014, IT Professional.
[85] Amitava Ghosh,et al. NB-IoT system for M2M communication , 2016, 2016 IEEE Wireless Communications and Networking Conference.
[86] Gu Li-ze,et al. Trust management mechanism for Internet of Things , 2014, China Communications.
[87] Jo Ann Oravec. Emerging “cyber hygiene” practices for the Internet of Things (IoT): Professional issues in consulting clients and educating users on IoT privacy and security , 2017, 2017 IEEE International Professional Communication Conference (ProComm).
[88] Dushantha Nalin K. Jayakody,et al. Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks , 2019, IEEE Transactions on Industrial Informatics.
[89] Dong Ren,et al. A forward fast media independent handover control scheme for Proxy Mobile IPv6 (FFMIH-PMIPv6) over heterogeneous wireless mobile network , 2017, Telecommun. Syst..
[90] Mohammed Atiquzzaman,et al. Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles , 2017, J. Netw. Comput. Appl..
[91] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[92] Tai-Myung Chung,et al. Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols , 2013, IEEE Transactions on Industrial Electronics.
[93] Anmin Fu,et al. An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network , 2012, Comput. Secur..
[94] Joerg Swetina,et al. Toward a standardized common M2M service layer platform: Introduction to oneM2M , 2014, IEEE Wireless Communications.
[95] Gerrit Bleumer,et al. Random Oracle Model , 2005, Encyclopedia of Cryptography and Security.
[96] Geir M. Køien,et al. Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[97] Djamal Zeghlache,et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..
[98] Bruce Ndibanje,et al. A Secure and Efficient Mutual Authentication Hand-off Protocol for Sensor Device Support in Internet of Things , 2017 .
[99] Xiaohui Liang,et al. CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service , 2014, IEEE Internet of Things Journal.
[100] Mohammad Abdullah Al Faruque,et al. Polarization Mode Dispersion-Based Physical Layer Key Generation for Optical Fiber Link Security , 2017 .
[101] Qiyan Wang,et al. VeCure: A practical security framework to protect the CAN bus of vehicles , 2014, 2014 International Conference on the Internet of Things (IOT).
[102] M. Laurent-Maknavicius,et al. PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT , 2018, Comput. Networks.
[103] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[104] Ilsun You,et al. A framework for mitigating zero-day attacks in IoT , 2018, ArXiv.
[105] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[106] M. Francisca Hinarejos,et al. RiskLaine: A Probabilistic Approach for Assessing Risk in Certificate-Based Security , 2018, IEEE Transactions on Information Forensics and Security.
[107] Elena Simona Lohan,et al. Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.
[108] Ira Cohen,et al. Real-time anomaly detection system for time series at scale , 2017, ADF@KDD.
[109] Rong Hao,et al. An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage , 2017, J. Internet Serv. Inf. Secur..
[110] Selwyn Piramuthu,et al. Security/privacy of wearable fitness tracking IoT devices , 2014, 2014 9th Iberian Conference on Information Systems and Technologies (CISTI).
[111] Igor V. Kotenko,et al. Parallel big data processing system for security monitoring in Internet of Things networks , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[112] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[113] Naser Movahedinia,et al. Context gathering and management for centralized context-aware handover in heterogeneous mobile networks , 2012 .
[114] Kai-Hsiang Ke,et al. Monitoring of Large-Area IoT Sensors Using a LoRa Wireless Mesh Network System: Design and Evaluation , 2018, IEEE Transactions on Instrumentation and Measurement.
[115] Sheikh Iqbal Ahamed,et al. AnonPri: A secure anonymous private authentication protocol for RFID systems , 2017, Inf. Sci..
[116] Emin Anarim,et al. A key agreement protocol with partial backward confidentiality , 2017, Comput. Networks.
[117] Qinglei Kong,et al. Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks , 2017, IEEE Internet of Things Journal.
[118] Awais Ahmad,et al. Enabling multimedia aware vertical handover Management in Internet of Things based heterogeneous wireless networks , 2017, Multimedia Tools and Applications.
[119] Anmin Fu,et al. A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[120] Jerker Delsing,et al. An authentication and access control framework for CoAP-based Internet of Things , 2014, IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society.
[121] Yong Tang,et al. Vulnerability Detection in IoT Firmware: A Survey , 2017, 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS).
[122] Jean-Marie Bonnin,et al. Distributed IP mobility management from the perspective of the IETF: motivations, requirements, approaches, comparison, and challenges , 2013, IEEE Wireless Communications.
[123] Hong Wen,et al. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.
[124] Makis Stamatelatos,et al. Enabling Crowd-sourcing-based Privacy Risk Assessment in EU: the Privacy Flag Project , 2017, PCI.
[125] Stefano Giordano,et al. A SDN-IoT Architecture with NFV Implementation , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[126] Andrea Zanella,et al. Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios , 2015, IEEE Wireless Communications.
[127] Selçuk Köse,et al. A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks , 2017, IEEE Transactions on Circuits and Systems I: Regular Papers.
[128] Jianqing Zhang,et al. Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).
[129] David Lake,et al. Internet of Things: Architectural Framework for eHealth Security , 2014, J. ICT Stand..
[130] Utz Roedig,et al. Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN , 2014, Secur. Commun. Networks.
[131] J. Kumar. SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD , 2016 .
[132] Dongman Lee,et al. An adaptive IoT trust estimation scheme combining interaction history and stereotypical reputation , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[133] George R. Milne,et al. Internet of Things: Convenience vs. privacy and secrecy , 2015 .
[134] Maode Ma,et al. An Efficient EAP-Based Pre-Authentication for Inter-WRAN Handover in TV White Space , 2017, IEEE Access.
[135] Fang-Yie Leu,et al. An Overview of 802.21a-2012 and Its Incorporation into IoT-Fog Networks Using Osmotic Framework , 2017, IoTaaS.
[136] Jean-Marie Bonnin,et al. Host-based distributed mobility management support protocol for IPv6 mobile networks , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[137] Dan Liu,et al. A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow , 2018, IEEE Access.
[138] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2018, Cluster Computing.
[139] Jin Li,et al. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.
[140] Ilsun You,et al. Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover , 2017, Future Gener. Comput. Syst..
[141] Olivier Flauzac,et al. SDN Based Architecture for IoT and Improvement of the Security , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.
[142] Kan Siew Leong,et al. A secure multi-hop routing for IoT communication , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[143] Prem Prakash Jayaraman,et al. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..
[144] José Italo Cortez,et al. Wireless Sensor Network for Monitoring Physical Variables Applied to Green Technology (IoT Green Technology) , 2018 .
[145] Francesco Palmieri,et al. Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..
[146] InJung Kim,et al. National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment , 2017, The Journal of Supercomputing.
[147] Houbing Song,et al. ESOT: a new privacy model for preserving location privacy in Internet of Things , 2018, Telecommun. Syst..
[148] Nan Zhang,et al. An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications , 2018, WWW.
[149] Ilsun You,et al. Resource-based mobility management for video users in 5G using catalytic computing , 2017, Comput. Commun..
[150] Jingjing Huang,et al. Compressed Sensing Method for Secret Key Generation Based on MIMO Channel Estimation , 2015 .
[151] Yong Chen,et al. A System Framework of Security Management in Enterprise Systems , 2013 .
[152] Md. Apel Mahmud,et al. Secured Communication among IoT Devices in the Presence of Cellular Interference , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).
[153] Antonio Iera,et al. A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[154] Patrick D. McDaniel,et al. Program Analysis of Commodity IoT Applications for Security and Privacy , 2018, ACM Comput. Surv..
[155] Victor I. Chang,et al. A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment , 2018, Future Gener. Comput. Syst..
[156] Ruhul Amin,et al. Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks , 2017, Multimedia Tools and Applications.
[157] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.
[158] Panagiotis Manolios,et al. Computer-aided reasoning : ACL2 case studies , 2000 .
[159] Victor C. M. Leung,et al. Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers , 2011, IEEE Transactions on Dependable and Secure Computing.
[160] Pinyi Ren,et al. Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.
[161] Junqing Zhang,et al. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview , 2017, Entropy.
[162] Zhiyong Feng,et al. Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things , 2017, IEEE Access.
[163] Luca Veltri,et al. IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios , 2015, IEEE Sensors Journal.
[164] 유영환,et al. Efficient Packet Transmission Utilizing Vertical Handover in IoT Environment , 2015 .
[165] Peilin Hong,et al. A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks , 2013, Int. J. Netw. Secur..
[166] Kalliopi Kravari,et al. ORDAIN: An Ontology for Trust Management in the Internet of Things - (Short Paper) , 2017, OTM Conferences.
[167] Riccardo Bonetto,et al. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[168] Shin-Ming Cheng,et al. Traffic-Aware Patching for Cyber Security in Mobile IoT , 2017, IEEE Communications Magazine.
[169] Ning Li,et al. Intelligent Cross-layer and Reliable Opportunistic Routing Algorithm for Internet of Things , 2017, ArXiv.
[170] Gennaro Boggia,et al. Standardized Protocol Stack for the Internet of (Important) Things , 2013, IEEE Communications Surveys & Tutorials.
[171] Ilsun You,et al. SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks , 2017, Comput. Networks.
[172] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[173] Flauzac Olivier,et al. New Security Architecture for IoT Network , 2015, ANT/SEIT.
[174] Neil W. Bergmann,et al. IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..
[175] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[176] K. Soundararajan,et al. Adopting cross layer approach for detecting and segregating malicious nodes in MANET , 2017, 2017 International Conference on Signal Processing and Communication (ICSPC).
[177] Farookh Khadeer Hussain,et al. A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT) , 2017, BWCCA.
[178] Roksana Boreli,et al. Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[179] Florian Kammüller,et al. Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[180] Lawrence C. Paulson,et al. Inductive analysis of the Internet protocol TLS , 1999, TSEC.
[181] Jun Luo,et al. An Attack Tree Based Risk Assessment for Location Privacy in Wireless Sensor Networks , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.
[182] Madjid Nakhjiri,et al. AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility , 2005 .
[183] Subutai Ahmad,et al. Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.
[184] Carsten Bormann,et al. 6LoWPAN: The Wireless Embedded Internet , 2009 .
[185] Xi Hongsheng,et al. Application of CLIPS Expert System to Malware Detection System , 2008, 2008 International Conference on Computational Intelligence and Security.
[186] Vasaka Visoottiviseth,et al. Dynamic key management for secure continuous handoff in wireless LAN , 2010, 2010 6th IEEE Workshop on Secure Network Protocols.
[187] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[188] Riccardo Rovatti,et al. Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks , 2018, IEEE Transactions on Information Forensics and Security.
[189] B. Latha,et al. HHSRP: a cluster based hybrid hierarchical secure routing protocol for wireless sensor networks , 2017, Cluster Computing.
[190] Asaf Shabtai,et al. Advanced Security Testbed Framework for Wearable IoT Devices , 2016, ACM Trans. Internet Techn..
[191] AKASHKUMAR RAJARAM,et al. Opportunistic-Harvesting: RF Wireless Power Transfer Scheme for Multiple Access Relays System , 2017, IEEE Access.
[192] Harsh Kupwade Patil,et al. Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.
[193] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[194] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[195] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[196] Ilangko Balasingham,et al. Risk-based adaptive security for smart IoT in eHealth , 2012, BODYNETS.
[197] Ralf Küsters,et al. Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[198] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[199] Hanno Wirtz,et al. Tailoring end-to-end IP security protocols to the Internet of Things , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[200] Jörg Daubert,et al. On the Security and Privacy of Internet of Things Architectures and Systems , 2015, 2015 International Workshop on Secure Internet of Things (SIoT).
[201] Jin Cao,et al. UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[202] Weiqing Huang,et al. A Polarization state Modulation based Physical Layer Security scheme for Wireless Communications , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[203] John R. Williams,et al. P3: Privacy Preservation Protocol for Automatic Appliance Control Application in Smart Grid , 2014, IEEE Internet of Things Journal.
[204] Ilsun You,et al. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers , 2017, Mob. Inf. Syst..
[205] Hsinchun Chen,et al. Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach , 2018, IEEE Intelligent Systems.
[206] Mads Dam,et al. Logical Omniscience in the Semantics of BAN Logic , 2003 .
[207] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[208] Pietro Manzoni,et al. Handling mobility in IoT applications using the MQTT protocol , 2015, 2015 Internet Technologies and Applications (ITA).
[209] Olivier Flauzac,et al. SDN-based security framework for the IoT in distributed grid , 2016, 2016 International Multidisciplinary Conference on Computer and Energy Science (SpliTech).
[210] David Blaauw,et al. Hardware Designs for Security in Ultra-Low-Power IoT Systems: An Overview and Survey , 2017, IEEE Micro.
[211] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[212] Indrakshi Ray,et al. A Generic Digital Forensic Investigation Framework for Internet of Things (IoT) , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).
[213] Hamid Al-Hamadi,et al. Trust-Based Decision Making for Health IoT Systems , 2017, IEEE Internet of Things Journal.
[214] Neetesh Saxena,et al. Authentication Protocol for an IoT-Enabled LTE Network , 2016, ACM Trans. Internet Techn..
[215] Antonio F. Gómez-Skarmeta,et al. A decentralized approach for security and privacy challenges in the Internet of Things , 2014, WF-IoT.
[216] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[217] Marthony Taguinod,et al. Policy-driven security management for fog computing: Preliminary framework and a case study , 2014, Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014).
[218] Claudio Bettini,et al. Longitude: Centralized Privacy-Preserving Computation of Users' Proximity , 2009, Secure Data Management.
[219] Lin Sun,et al. Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications , 2015, IACR Cryptol. ePrint Arch..
[220] Jin Cao,et al. An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks , 2012, IEEE Transactions on Wireless Communications.
[221] Alireza Ghasempour,et al. Optimized scalable decentralized hybrid advanced metering infrastructure for smart grid , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[222] Hadi Syafruddin,et al. Performance analysis of using a reliable transport layer protocol for transmitting EAP message over RADIUS in inter-domain WLAN roaming , 2010, Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010.
[223] Victor C. M. Leung,et al. Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper , 2016, IEEE Access.
[224] Qian Xu,et al. Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.
[225] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[226] Antonio F. Gómez-Skarmeta,et al. Privacy-Preserving Security Framework for a Social-Aware Internet of Things , 2014, UCAmI.
[227] Sotirios K. Goudos,et al. A Survey of IoT Key Enabling and Future Technologies: 5G, Mobile IoT, Sematic Web and Applications , 2017, Wirel. Pers. Commun..
[228] Sasan Adibi. A novel energy-efficient cross-application-layer platform with QoS-security support , 2017, Int. J. Commun. Syst..
[229] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[230] Debasis Das,et al. Algorithm for Trust Based Policy Hidden Communication in the Internet of Things , 2017, 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops).
[231] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[232] Haiyong Bao,et al. A lightweight privacy‐preserving scheme with data integrity for smart grid communications , 2016, Concurr. Comput. Pract. Exp..
[233] Daniel W. Engels,et al. Black SDN for the Internet of Things , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[234] Otto Carlos Muniz Bandeira Duarte,et al. An Adaptive Real-Time Architecture for Zero-Day Threat Detection , 2018, 2018 IEEE International Conference on Communications (ICC).
[235] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[236] Abderrahim Benslimane,et al. On location-privacy in opportunistic mobile networks, a survey , 2018, J. Netw. Comput. Appl..
[237] Soma Bandyopadhyay,et al. IoT-Privacy: To be private or not to be private , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[238] Jiri Hosek,et al. On perspective of security and privacy-preserving solutions in the internet of things , 2016, Comput. Networks.
[239] Saurabh Bagchi,et al. TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices , 2017, IEEE Internet Computing.
[240] Lei Zou,et al. K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..
[241] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[242] Ji Wang,et al. Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks , 2018, Comput. Commun..
[243] Hong Liu,et al. Cyber-Physical-Social Based Security Architecture for Future Internet of Things , 2012, IOT 2012.
[244] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[245] Kathiravan Srinivasan,et al. Managing Service-Heterogeneity using Osmotic Computing , 2017, ArXiv.
[246] In-Young Ko,et al. Spatially Cohesive Service Discovery and Dynamic Service Handover for Distributed IoT Environments , 2017, ICWE.
[247] Sudip Misra,et al. Detour: Dynamic Task Offloading in Software-Defined Fog for IoT Applications , 2019, IEEE Journal on Selected Areas in Communications.
[248] Victor C. M. Leung,et al. Secure Communications in CIoT Networks with a Wireless Energy Harvesting Untrusted Relay , 2017, Sensors.
[249] Gene Tsudik,et al. Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices , 2017, SenSys.
[250] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[251] Nicola Bui,et al. Low power link layer security for IoT: Implementation and performance analysis , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[252] Isaac Woungang,et al. Impact Study of a Mobile Botnet over LTE Networks , 2016, J. Internet Serv. Inf. Secur..
[253] Qiong Huang,et al. Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols , 2017, J. Internet Serv. Inf. Secur..
[254] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[255] Davor Svetinovic,et al. A taxonomy of security and privacy requirements for the Internet of Things (IoT) , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.
[256] Thilo Sauter,et al. Seamless handover in industrial WLAN using IEEE 802.11k , 2017, 2017 IEEE 26th International Symposium on Industrial Electronics (ISIE).
[257] Antonio F. Gómez-Skarmeta,et al. SAFIR: Secure access framework for IoT-enabled services on smart buildings , 2015, J. Comput. Syst. Sci..
[258] Fernand Meyer,et al. A comparative study of LPWAN technologies for large-scale IoT deployment , 2019, ICT Express.
[259] Christian Steger,et al. Secured and Easy-to-Use NFC-Based Device Configuration for the Internet of Things , 2017, IEEE Journal of Radio Frequency Identification.
[260] Ilsun You,et al. Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.
[261] Zhu Han,et al. Jamming Mitigation via Hierarchical Security Game for IoT Communications , 2018, IEEE Access.
[262] Maurizio A. Spirito,et al. DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.
[263] Elisa Bertino,et al. Data Security and Privacy in the IoT , 2016, EDBT.
[264] David Monniaux. Decision procedures for the analysis of cryptographic protocols by logics of belief , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[265] Yang Yu,et al. Distributed Trust Management Mechanism for the Internet of Things , 2013 .
[266] Antonio F. Gómez-Skarmeta,et al. ANASTACIA: Advanced networked agents for security and trust assessment in CPS IoT architectures , 2017, 2017 Global Internet of Things Summit (GIoTS).
[267] Jinho Choi,et al. Physical Layer Security for Channel-Aware Random Access With Opportunistic Jamming , 2017, IEEE Transactions on Information Forensics and Security.
[268] Mary R. Schurgot,et al. Experiments with security and privacy in IoT networks , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[269] Kai-Di Chang,et al. A Survey of Trust Management in WSNs, Internet of Things and Future Internet , 2012 .
[270] Salvador Pérez,et al. Towards the CP-ABE Application for Privacy-Preserving Secure Data Sharing in IoT Contexts , 2017, IMIS.
[271] Jun Li,et al. Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.
[272] Hsing-Chung Chen,et al. Fuzzy-Based Protocol for Secure Remote Diagnosis of IoT Devices in 5G Networks , 2017, IoTaaS.
[273] Geeta Sharma,et al. A secure remote user authentication scheme for smart cities e-governance applications , 2017, Journal of Reliable Intelligent Environments.
[274] Thuy Ngoc Nguyen,et al. Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks , 2012, IEEE Transactions on Wireless Communications.
[275] Theodore Tryfonas,et al. The Internet of Things: a security point of view , 2016, Internet Res..
[276] Dong Seong Kim,et al. A Framework for Modeling and Assessing Security of the Internet of Things , 2015, 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS).
[277] Ilsun You,et al. Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs , 2017, IEEE Network.
[278] Qingtao Wu,et al. An IOT Security Risk Autonomic Assessment Algorithm , 2013 .
[279] Konrad S. Wrona,et al. Data-centric security in military applications of commercial IoT technology , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[280] Dushantha Nalin K. Jayakody,et al. Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things , 2017, Future Gener. Comput. Syst..
[281] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[282] David Evans,et al. Efficient Data Tagging for Managing Privacy in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[283] Lyes Khoukhi,et al. Enhanced MIH (media independent handover) for collaborative green wireless communications , 2017, Int. J. Commun. Syst..
[284] Yong Ho Hwang. IoT Security & Privacy: Threats and Challenges , 2015, IoTPTS@AsiaCCS.
[285] Kshira Sagar Sahoo,et al. A secured SDN framework for IoT , 2015, 2015 International Conference on Man and Machine Interfacing (MAMI).
[286] Hsiao-Hwa Chen,et al. An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.
[287] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[288] Igor Santos,et al. Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..
[289] Cristina Alcaraz,et al. A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.
[290] Keon Chul Park,et al. Security assessment framework for IoT service , 2017, Telecommun. Syst..
[291] Jia Guo,et al. Trust management for service composition in SOA-based IoT systems , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[292] Erdal Irmak,et al. A hybrid trust based intrusion detection system for wireless sensor networks , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).
[293] Wei Shi,et al. E-learning Material Development Framework Supporting VR/AR Based on Linked Data for IoT Security Education , 2018, EIDWT.
[294] Stephen S. Yau,et al. A Reference Architecture for Improving Security and Privacy in Internet of Things Applications , 2014, 2014 IEEE International Conference on Mobile Services.
[295] Todd K. Moon,et al. Optimizing the Number of Collectors in Machine-to-Machine Advanced Metering Infrastructure Architecture for Internet of Things-Based Smart Grid , 2016, 2016 IEEE Green Technologies Conference (GreenTech).
[296] Omaimah Bamasag,et al. A LIGHTWEIGHT PRIVACY AND INTEGRITY PRESERVING DATA COMMUNICATION IN SMART GRID , 2015 .
[297] Wei Liu,et al. A Neighbor-Based Probabilistic Broadcast Protocol for Data Dissemination in Mobile IoT Networks , 2018, IEEE Access.
[298] Jari Veijalainen,et al. Security and privacy threats in IoT architectures , 2012, BODYNETS.
[299] Ilsun You,et al. Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT) , 2018, IEEE Access.
[300] Ejaz Ahmed,et al. Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges , 2017, Future Gener. Comput. Syst..
[301] Albert Y. Zomaya,et al. NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection in Online Social Networks , 2018, IEEE Transactions on Knowledge and Data Engineering.
[302] K SoodSandeep,et al. Secure authentication scheme for IoT and cloud servers , 2015 .
[303] Alina Campan,et al. Data and Structural k-Anonymity in Social Networks , 2009, PinKDD.
[304] S. B. Thorat,et al. Lightweight Anonymity-Preserving Authentication and Key Agreement Protocol for the Internet of Things Environment , 2017 .
[305] Kevin Benton,et al. OpenFlow vulnerability assessment , 2013, HotSDN '13.
[306] Flora Malamateniou,et al. Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).
[307] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[308] Oumaima Ben Abderrahim,et al. TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[309] Hung-Yu Chien,et al. Secure fast WLAN handoff using time-bound delegated authentication , 2009 .
[310] Hengrun Zhang,et al. A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing , 2018, IEEE Internet of Things Journal.
[311] Almudena Alcaide,et al. Anonymous authentication for privacy-preserving IoT target-driven applications , 2013, Comput. Secur..
[312] Mauro Conti,et al. Advertising in the IoT Era: Vision and Challenges , 2018, IEEE Communications Magazine.
[313] Gyu Myoung Lee,et al. Autonomic Trust Management in Cloud-Based and Highly Dynamic IOT Applications , 2016 .
[314] Antonio Iera,et al. Federated IoT services leveraging 5G technologies at the edge , 2018, Ad Hoc Networks.
[315] Navrati Saxena,et al. Novel framework for proactive handover with seamless multimedia over WLANs , 2011, IET Commun..
[316] Huachun Zhou,et al. Application-aware and Dynamic Security Function Chaining for Mobile Networks , 2017, J. Internet Serv. Inf. Secur..
[317] Nirmal Dagdee,et al. Credential Based Hybrid Access Control Methodology for Shared Electronic Health Records , 2009, 2009 International Conference on Information Management and Engineering.
[318] Hyeong-Ah Choi,et al. Securing smart home: Technologies, security challenges, and security requirements , 2014, 2014 IEEE Conference on Communications and Network Security.
[319] Souhwan Jung,et al. A handover authentication using credentials based on chameleon hashing , 2010, IEEE Communications Letters.
[320] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[321] Peter Herrmann,et al. A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).
[322] Peter Herrmann,et al. A Trust-based Resilient Routing Mechanism for the Internet of Things , 2017, ARES.
[323] Ilsun You,et al. Socializing Drones for Inter-Service Operability in Ultra-Dense Wireless Networks using Blockchain , 2017, MIST@CCS.
[324] Yang Li,et al. DeepXSS: Cross Site Scripting Detection Based on Deep Learning , 2018, ICCAI.
[325] Chung-Horng Lung,et al. IoT-equipped UAV communications with seamless vertical handover , 2017, 2017 IEEE Conference on Dependable and Secure Computing.
[326] Sheetal Kalra,et al. A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..
[327] Soma Bandyopadhyay,et al. Privacy for IoT: Involuntary privacy enablement for smart energy systems , 2015, 2015 IEEE International Conference on Communications (ICC).
[328] Fang-Yie Leu,et al. Secure and efficient protocol for fast handover in 5G mobile Xhaul networks , 2018, J. Netw. Comput. Appl..
[329] Vishal Sharma,et al. LoRaWAN-Based Energy-Efficient Surveillance by Drones for Intelligent Transportation Systems , 2018 .
[330] Giuseppe Piro,et al. Optimal and secure protocols in the IETF 6TiSCH communication stack , 2014, 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE).
[331] Ludwig Seitz,et al. Authorization framework for the Internet-of-Things , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[332] Indrajit Ray,et al. Measuring, analyzing and predicting security vulnerabilities in software systems , 2007, Comput. Secur..
[333] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[334] Arghya Guchhait,et al. A hybrid V2V system for collision-free high-speed internet access in intelligent transportation system , 2018, Trans. Emerg. Telecommun. Technol..
[335] Zheng Yan,et al. SecIoT: a security framework for the Internet of Things , 2016, Secur. Commun. Networks.
[336] Kisu Kim,et al. Method of Building a Security Vulnerability Information Collection and Management System for Analyzing the Security Vulnerabilities of IoT Devices , 2017, MUE/FutureTech.
[337] Alireza Chasempour,et al. Optimizing the Advanced Metering Infrastructure Architecture in Smart Grid , 2016 .
[338] Abdullahi Chowdhury. Cyber attacks in mechatronics systems based on Internet of Things , 2017, 2017 IEEE International Conference on Mechatronics (ICM).
[339] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[340] Alex Pentland,et al. Toward an Interoperability Architecture for Blockchain Autonomous Systems , 2020, IEEE Transactions on Engineering Management.
[341] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[342] Lorenzo Mucchi,et al. Physical layer security for IoT devices configuration and key management - a Proof of Concept , 2016, 2016 AEIT International Annual Conference (AEIT).
[343] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[344] Jing Xu,et al. Physical layer security based on artificial noise and spatial modulation , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[345] Rituparna Chaki,et al. Study of Security Issues in Pervasive Environment of Next Generation Internet of Things , 2013, CISIM.
[346] Ilsun You,et al. ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT , 2017, IEEE Access.
[347] Fangyu Gai,et al. Multidimensional Trust-Based Anomaly Detection System in Internet of Things , 2017, WASA.
[348] Hung-Yu Chien,et al. Fast pre-authentication with minimized overhead and high security for WLAN handoff , 2008 .
[349] Jie Wu,et al. PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems , 2018, IEEE Communications Magazine.
[350] Geir M. Køien,et al. Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context , 2011, Wirel. Pers. Commun..
[351] Antonio F. Gómez-Skarmeta,et al. An Architecture Based on Internet of Things to Support Mobility and Security in Medical Environments , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.