References
- Santhosh Krishna B V, Gnanasekaran T.: A Systematic Study of Security Issues in Internet-of-Things (IoT), presented at IEEE International conference on I-SMAC (2017).
- Chang-le Zhong, Zhen Zhu, Ren-gen Huang. C: Study on the IOT Architecture and Access Technology, presented at IEEE 16th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (2017).
- Vangelis Gazis, Manuel Goertz, Marco Huber, Alessandro Leonardi. C: IoT: Challenges, Projects, Architectures, presented at IEEE 5th International Conference on Intelligence in Next Generation Networks (2015).
- Jeffry Voas, Bill Agresti. T: A Closer Look at the IOT "things", published in IEEE Computer Society, Vol. 20, Issue 30, pp. 6-15 (2018).
- SulabhBhattarai,Yong Wang. T: End-to-End Trust and Security for Internet of Things Applications", published in IEEE Computer Society (2015).
- Mardianabinti Mohamad Noor, Wan Haslina Hassan. T: Current research on Internet of Things (IoT) security: A survey, published in ELSEVEIR Computer Networks, pp. 283-294 (2019).
- Tarak Nandy, Norjihan Abdul Ghani, Sananda Bhattacharya. T: Review on Security of Internet of Things Authentication Mechanism, published in IEEE Access, Vol. 7, pp. 151054- 151089 (2019).
- Hokeun Kim, Edward A. Lee. T: Authentication and Authorization for the Internet of Things, published in IEEE Computer Society (2017).
- Hirofumi Noguchi, Misao Kataoka, Yoji Yamato. T: Device Identification Based on Communication Analysis for the Internet of Things, published in IEEE Access (2019).
- Mohammad Wazid, Ashok Kumar Das, VangaOdeluc et al T: Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks, published in IEEE Internet of Things Journal (2017).
- Ning Wang, Ting Jiang, Shichaolyet al. T: Physical-Layer Authentication Based on Extreme Learning Machine, published in IEEE Internet of Things Journal, (2016).
- Muhammad Naveed Aman, Sachin Taneja et al. T: Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff, published in IEEE Internet of Things Journal (2015).
- Prosanta Gope, Biplab Sikdar. T: Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices, IEEE Internet of Things Journal, (2018).
- Muhammad Naveed Aman, Mohamed Haroon Basheer, Biplab Sikdar. T: Two factor Authentication for IOT with Location Information, IEEE Internet of Things Journal (2017).
- Yan Zhao, Shimming Li, Liehui Jiang. T: Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment, WILEY Hindawai Security and Communication Networks, (2015).
- Majid Alotaibi. T: An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN", IEEE Access (2015).
- Zahoor Ahmed Alizai, Noquia Fatima Tareen, Iqura Jadoon C: Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures, IEEE International Conference on Applied and Engineering Mathematics (2015).
- Vikas Hassija, Vinay Chamolaet al. T: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures, published in IEEE Access (2019).
- Jyoti Deogirikar, Amarsinh Vidhate T: Security Attacks in IoT: A Survey presented at IEEE International conference on I-SMAC (2017).
- Chang-le Zhong, Zhen Zhu, Ren-gen Huang. C: Study on the IOT Architecture and Access Technology, presented at IEEE 16th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, (2017).
- Daniel A.F.Saravia, Paul Crocker. T: PRISECComparison of Symmetric key algorithms for IOT, Sensors (2019).
- Lin Wang, Zhou Chang. T: Security Enhancement on a Light Weight Authentication Scheme with Anonymity Fog Computing Architecture, Vol.8, IEEE Access (2020).
- Yuichi Kawamoto, Hiroki Nishiyama T.: Effectively Collecting Data for the Location-Based Authentication in Internet of Things, IEEE System Journal, (2015).
- Omar Alfandi, Arne Bochem. T: Secure and Authenticated Data Communication in Wireless Sensor Networks, Sensors (2015).
- Adel Ali Ahmed, Waleed Ali Ahmed. T: An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things, Sensors (2019)