The New Advanced Society. Группа авторов
IEEE Internet Things J., 4, 5, 1327–1340, 017.
7. Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.G., Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst., 78, 943–955, 2018.
8. Gong, B., Zhang, Y., Wang, Y., A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener. Comput. Syst., 78, 867–886, 2018.
9. Roychoudhury, P., Roychoudhury, B., Saikia, D.K., Provably secure group authentication and key agreement for machine type communication using Chebyshev’s polynomial. Comput. Commun., 127, 146–157, 2018.
10. Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A., Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur., 78, 126–142, 2018.
11. Feng, W., Qin, Y., Zhao, S., Feng, D., AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw., 134, 167–182, 2018.
12. Gope, P. and Sikdar, B., Lightweight and privacy-preserving two factor authentication scheme for IoT devices. IEEE Internet Things J., 6, 580–589, 2019.
13. Cha, S.C., Chen, J.F. et al., A blockchain connected gateway for BLE-based devices in the Internet of Things. IEEE Access, 6, 24639–24649, 2018.
14. Xiong, Z., Zhang, Y. et al., When mobile blockchain meets edge computing. IEEE Commun. Mag., 56, 8, 33–39, 2018.
15. Li, R., Song, T. et al., Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput., 12, 5, 762–771, 2018.
16. Sharma, P.K., Chen, M., Park, J.H., A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access, 6, 115–124, 2018.
17. Manzoor, A., Liyanage, M. et al., Blockchain based proxy re-encryption scheme for secure IoT data sharing, in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 99–103, May 2019.
18. Lu, Y. and Li, J., A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst., 62, 140–147, 2016.
19. Kim, S.K., Kim, U.M. et al., A study on improvement of blockchain application to overcome vulnerability of IoT multiplatform security. Energies, 12, 3, 402, 2019.
20. Huh, J.H. and Seo, K., Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing. J. Supercomput., 75, 6, 3123–3139, 2019.
21. Liu, H.C., Lin, Q., Wen, S., Blockchain-enabled Data Collection and Sharing for Industrial IoT with Deep Reinforcement Learning. IEEE Trans. Industr. Inform., 15, 3516–3526, 2018.
22. Hammi, B., Khatoun, R., Zeadally, S., Fayad, A., Khoukhi, L., IoT technologies for smart cities. IET Netw., 7, 1–13, 2017.
23. Baker, T., Asim, M., MacDermott, A. et al., A secure fog-based platform for SCADA-based IoT critical infrastructure. Software Pract. Exp., 2019.
24. Goyal, T.K. and Sahula, V., Lightweight security algorithm for low power IoT devices, in: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1725–1729, 2016.
*Corresponding author: [email protected]
Конец ознакомительного фрагмента.
Текст предоставлен ООО «ЛитРес».
Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.
Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.