1 |
Lijia Chen, Jintao Xiong, Liangchao Li, Zongjie Cao, and Jianyu Yang, "Research on a novel method for identification friend or foe based on fuzzy c-means and dynamic Bayesian network," in Proc. of 2011 IEEE CIE International Conference on Radar, pp. 1656-1659, 2011.
|
2 |
El-hajj, M. Chamoun, A. Fadlallah, and A. Serhrouchni, "Analysis of authentication techniques in Internet of Things (IoT)," in Proc. of 2017 1st Cyber Security in Networking Conference (CSNet), pp. 1-3, 2017.
|
3 |
Chang and H. Le, "A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks," IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 357-366, Jan. 2016.
DOI
|
4 |
Rasheed and R. N. Mahapatra, "The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 5, pp. 958-965, May 2012.
DOI
|
5 |
E. A. M. Anita and J. Jenefa, "A survey on authentication schemes of VANETs," in Proc. of 2016 International Conference on Information Communication and Embedded Systems (ICICES), pp. 1-7, 2016.
|
6 |
Meddeb-Makhlouf, N. Meddeb and M. A. B. Ayed, "An Enhanced Multilevel Authentication Protocol for VANETs," in Proc. of 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), pp. 1232-1238, 2017.
|
7 |
S. V. Nesteruk, V. Y. Kovalenko, and S. V. Bezzateev, "A Survey on Localized Authentication Protocols for Wireless Sensor Networks," in Proc. of 2018 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), pp. 1-7, 2018.
|
8 |
Liu, Jing, Yang Xiao, and CL Philip Chen, "Authentication and access control in the internet of things," in Proc. of IEEE 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 588-592, 2012.
|
9 |
K.H. Lee and J.S Lee, "Mutual authentication method for hash chain based sensors in IoT environment," Journal of the Korea Academia-Industrial cooperation Society, vol. 19, No. 11, pp. 303-309, 2018.
DOI
|
10 |
Bamasag, Omaimah Omar, and Kamal Youcef-Toumi, "Towards continuous authentication in internet of things based on secret sharing scheme," in Proc. of the WESS'15: Workshop on Embedded Systems Security, pp. 1-8, 2015.
|
11 |
H. Liu, Y. Chen, H. Tian, T. Wang, and Y. Cai, "A novel secure message delivery and authentication method for vehicular ad hoc networks," in Proc. of 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI), pp. 135-139, 2016.
|
12 |
P. Vijayakumar, M. Azees, A. Kannan, and L. Jegatha Deborah, "Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 4, pp. 1015-1028, April 2016.
DOI
|
13 |
A. Perrig, R. Canetti, J. D. Tygar, and Dawn Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. of 2000 IEEE Symposium on Security and Privacy, pp. 56-73, 2000.
|
14 |
M. Younis, O. Farrag, and B. Althouse, "TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks," IEEE Transactions on Network and Service Management, vol. 9, no. 1, pp. 100-113, March 2012.
DOI
|
15 |
Lamport, Leslie, "Password authentication with insecure communication," Communications of the ACM vol. 24, no. 11, pp. 770-772, 1981.
DOI
|