BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology
Tóm tắt
Từ khóa
Tài liệu tham khảo
Adeel A, Ali M, Khan AN, Khalid T, Rehman F, Jararweh Y, Shuja J (2019) A multi-attack resilient lightweight iot authentication scheme. Transactions on Emerging Telecommunications Technologies, pp e3676
Ahuja SP, Wheeler N (2020) Architecture of fog-enabled and cloud-enhanced internet of things applications. Int J Cloud Appl Comput (IJCAC) 10(1):1–10
Ali R, Pal AK (2018) An efficient three factor–based authentication scheme in multiserver environment using ecc. Int J Commun Syst 31(4):e3484
Ali R, Pal AK, Kumari S, Karuppiah M, Conti M (2018) A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Futur Gener Comput Syst 84:200–215
Aman MN, Chua KC, Sikdar B (2017) Mutual authentication in iot systems using physical unclonable functions. IEEE Internet Things J 4(5):1327–1340
Bellare M, Rogaway P (1993) Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on Computer and communications security, pp 62–73
Berenjian S, Hajizadeh S, Atani RE (2019) An incentive security model to provide fairness for peer-to-peer networks. In: 2019 IEEE Conference on Application, Information and Network Security (AINS). IEEE, pp 71–76
Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version from 05–16
Cao J, Ma M, Li H, Ma R, Sun Y, Yu P, Xiong L (2019) A survey on security aspects for 3gpp 5g networks. IEEE Communications Surveys & Tutorials
Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon E-J, Yoo K-Y (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028–3043
Das AK, Wazid M, Yannam AR, Rodrigues JJ, Park Y (2019) Provably secure ecc-based device access control and key agreement protocol for iot environment. IEEE Access 7:55382–55397
Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2017) Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks 2017
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot) A vision, architectural elements, and future directions. Fut Gen Comput Syst 29(7):1645–1660
Gupta R (2019) Resource provisioning and scheduling techniques of iot based applications in fog computing. Int J Fog Comput (IJFC) 2(2):57–70
Hussain MM, Beg MS (2019) Using vehicles as fog infrastructures for transportation cyber-physical systems (t-cps) Fog computing for vehicular networks. Int J Softw Sci Comput Intell (IJSSCI) 11(1):47–69
Javaid U, Aman MN, Sikdar B (2018) Blockpro: Blockchain based data provenance and integrity for secure iot environments. In: Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, pp 13–18
Kadhim AJ, Seno SAH (2019) Energy-efficient multicast routing protocol based on sdn and fog computing for vehicular networks. Ad Hoc Netw 84:68–81
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference. Springer, pp 388–397
Li D, Deng L, Gupta B, Wang H, Choi C (2019) A novel cnn based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447
Li N, Liu D, Nepal S (2017) Lightweight mutual authentication for iot and its applications. IEEE Trans Sustain Comput 2(4):359–370
Malani S, Srinivas J, Das AK, Srinathan K, Jo M (2019) Certificate-based anonymous device access control scheme for iot environment. IEEE Internet Things J 6(6):9762–9773
Maurya AK, Sastry VN (2017) Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and internet of things. Information 8(4):136
Naghizadeh A, Berenjian S, Razeghi B, Shahanggar S, Pour NR (2015) Preserving receiver’s anonymity for circular structured p2p networks. In: 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, pp 71–76
Naghizadeh A, Berenjian S, Meamari E, Atani RE (2016) Structural-based tunneling: preserving mutual anonymity for circular p2p networks. Int J Commun Syst 29(3):602–619
Nakamoto S et al (2008) Bitcoin: A peer-to-peer electronic cash system
Pena-lópez I et al (2005) Itu internet report 2005: the internet of things
Psannis KE, Stergiou C, Gupta B (2018) Advanced media-based smart big data on intelligent cloud systems. IEEE Trans Sustain Comput 4(1):77–87
PUB F (1995) Secure hash standard. Public Law 100:235
Roy S, Das AK, Chatterjee S, Kumar N, Chattopadhyay S, Rodrigues JJ (2018) Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Trans Ind Inf 15(1):457–468
Sethia D, Gupta D, Saran H (2018) Nfc secure element-based mutual authentication and attestation for iot access. IEEE Trans Consum Electron 64(4):470–479
Srinivas J, Das AK, Wazid M, Kumar N (2018) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Transactions on Dependable and Secure Computing
Stergiou C, Psannis KE, Gupta B, Ishibashi Y (2018) Security, privacy & efficiency of sustainable cloud computing for big data & iot. Sustain Comput Inf Syst 19:174–184
Tewari A, Gupta B (2017) A lightweight mutual authentication protocol based on elliptic curve cryptography for iot devices. Int J Adv Intell Parad 9(2-3):111–121
Tewari A, Gupta B (2020) Security, privacy and trust of different layers in internet-of-things (iots) framework. Fut Gen Comput Syst 108:909–920
Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2017) Design of secure user authenticated key management protocol for generic iot networks. IEEE Internet Things J 5(1):269–282
Wazid M, Das AK, Shetty S, Rodrigues JJPC, Park Y (2019) Ldakm-eiot: Lightweight device authentication and key management mechanism for edge-based iot deployment. Sensors 19(24):5539
Wu T-Y, Lee Z, Obaidat MS, Kumari S, Kumar S, Chen C-M (2020) An authenticated key exchange protocol for multi-server architecture in 5g networks. IEEE Access 8:28096–28108
Xie J, Tang H, Huang T, Yu FR, Xie R, Liu J, Liu Y (2019) A survey of blockchain technology applied to smart cities Research issues and challenges. IEEE Commun Surv Tutorial 21(3):2794–2830
Zhou L, Li X, Yeh K-H, Su C, Chiu W (2019) Lightweight iot-based authentication scheme in cloud computing circumstance. Futur Gener Comput Syst 91:244–251
Zhu Q, Loke SW, Trujillo-Rasua R, Jiang F, Xiang Y (2019) Applications of distributed ledger technologies to the internet of things A survey. ACM Comput Surv (CSUR) 52(6):1–34