1 |
A Sajid, H Abbas, and K Saleem, "Cloud-assisted IoT-based SCADA systems security: a review of the state of the art and future challenges," IEEE Access, vol. 4 pp. 1375-1384, Mar. 2016.
DOI
|
2 |
Atzori, Luigi, Antonio Iera, and Giacomo Morabito, "The internet of things: A survey," Science Direct journal of Computer Networks, vol.54, no.15, pp.2787-2805, May 2010.
DOI
|
3 |
Yinghui H. and Guanyu L., "Descriptive models for internet of things," IEEE International Conference on Intelligent Control and Information Processing, pp. 483-486, Aug. 2010.
|
4 |
Yuxi Liu and Guohui Zhou, "Key technologies and applications of internet of things," IEEE Fifth International Conference on Intelligent Computation Technology and Automation, pp. 197-200, Jan. 2012.
|
5 |
Huansheng N. and Ziou Wang, "Future internet of things architecture: Like mankind neural system or social organization framework?," IEEE Communication Letters, vol. 15, no. 4, pp. 461-463, Apr. 2011.
DOI
|
6 |
A. Perrig, D. Song, and J.D. Tygar. "ELK, A new protocol for efficient large-group key distribution," in Proceeding of the IEEE Symposium on Security and Privacy (IEEE S&P), pp. 247-262, 2001.
|
7 |
S. Setia, S. Koussih, S. Jajodia, and E. Harder, "Kronos: a scal-able group re-keying approach for secure multicast," in Proceedings of the IEEE Symposium on Security and Privacy (IEEE S&P), pp. 215 - 228, Jan. 2000.
|
8 |
A. T. Sherman and D. A. Mcgrew, "Key establish-ment in large dynamic groups using one-way function trees," IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444-458, May 2003.
DOI
|
9 |
Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, "Reliable group rekeying: a performance analysis," in Proceeding of ACM SIGCOMM'01, pp. 27-38, Aug. 2001.
|
10 |
X. B. Zhang, S. S. Lam, D. Y. Lee, and Y. R. Yang, "Protocol design for scalable and reliable group rekeying," IEEE/ACM Transactions on Net-working, vol. 11, no. 6, pp. 908-922, Dec. 2003.
DOI
|
11 |
Y. Kim. A. Perrigm, and G. Tsudik. "Simple and fault-tolerant key agreement for dynamic collaborative groups," in 7th ACM Conference on Computer and Communications Security (CCS'00), pp. 235-24, Nov. 2004.
|
12 |
Arijit Ukil, Jaydip Sen, and Sripad Koilakonda, "Embedded security for internet of things," IEEE International Conference on Emerging Trends and Applications in Computer Science (NCETACS), pp 1-6, Apr. 2011.
|
13 |
Top Threats Working Group, "The notorious nine: cloud computing top threats in 2013," https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf.
|
14 |
https://www.cloudfoundry.org/futurenetwork-security-cloud-foundry/
|
15 |
J. Park, S. Shin, and N. Kang, "Mutual authentication and key agreement scheme between lightweight devices in internet of things," The Journal of Korean Institute of Communications and Information Sciences, 38(9), pp. 707-714, Sept. 2013.
|
16 |
R. Hummen et al., "Towards viable certificate-based authentication for the internet of things," WISEC'13 Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 37-42, Apr. 2013.
|