1 |
M. Diaz, C. Martin, and B. Rubio, "State-of-the-art, Challenges, and Open Issues in the Integration of Internet of Things and Cloud Computting," Journal of Network and Computer Applications, Vol. 67, pp. 99-117, 2016.
DOI
|
2 |
Q. Zhang, L. Cheng, and R. Boutaba, “Cloud Computing: State-of-the-art and Research Challenges,” Journal of Internet Services and Applications, Vol. 1, No. 1, pp. 7-18, 2010.
DOI
|
3 |
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog Computing and Its Role in the Internet of Things," Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computting, pp. 13-16, 2012.
|
4 |
A.V. Dastjerdi and R. Buyya, "Fog Computing: Helping the Internet of Things Realize Its Potential," Computer, Vol. 49, Issue 8, pp. 112-116, 2016.
DOI
|
5 |
D. Dujovne, T. Watteyne, X. Vilajosana, and P. Thubert, “6TiSCH: Deterministic IP-enabled Industrial Internet(of Things),” IEEE Communications Magazine, Vol. 52, No. 12, pp. 36-41, 2014.
DOI
|
6 |
E. Borgia, "The Internet of Things Vision: Key Features, Applications and Open Issues," Computer Communications, Vol. 54, pp. 1-31, 2014.
DOI
|
7 |
J.S. Zielinsku, “Internet of Everything (IoE) in Smart Grid,” Przeglad Elektrotechniczny, Vol. 91, No. 3, pp. 157-159, 2015.
|
8 |
P.A.F. Vitti, D.R. dos Santos, C.B. Westphall, C.M. Westphall, and K.M.M. Vieir, "Current Issues in Cloud Computing Security and Management," Secuware 2014, pp. 36-42, 2014.
|
9 |
S. Sarkar, V.K. Bharadwaj, and G. Priya, “Security Issues and Challenges in Cloud Computing,” International Research Journal of Engineering and Technology, Vol. 3, No. 10, pp. 1143-1146, 2016.
|
10 |
R. Arora and A. Parashar, "Secure User Data in Cloud Computing Using Encryption Algorithms," International Journal of Engineering Research and Applications, Vol. 3, No. 4, pp. 1922-1926, 2013.
|
11 |
NIST, Advanced Encryption Standard(AES), Federal Information Processing Standards Publication 197(FIPS-197), 2001.
|
12 |
IEEE, PART 11: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11i, 2004.
|
13 |
S. Chae, Y. Yang, and T. Han, "The Fourth Industrial Revolution and Multimedia Converging Technology: Pervasive AR Platform Construction Using a Mobile Robot based Projection Technology," Journal of Korea Multimedia Society, Vol. 20, No. 2, pp. 298-312, 2017.
DOI
|
14 |
D. Hong, J.K. Lee, D.C. Kim, D. Kwon, K.H. Ryu, and D.G. Lee, "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," Proceeding of International Workshop on Information Security Applications, pp. 3-27, 2013.
|
15 |
IETF, Hypertext Transfer Protocol (HTTP/1.1): Authentication, RFC 7235, 2014.
|
16 |
IETF, Remote Authentication Dial-In User Service (RADIUS) Protocol Extensions, RFC 6929, 2013.
|
17 |
IEEE, IEEE Standard for Ethernet, IEEE Std 802.3, 2012.
|
18 |
IETF, Diffie-Hellman Key Agreement Method, RFC 2631, 1999.
|
19 |
J.S. Coron, Y. Dodis, C. Malinaud, and P. Puniya, "Merkle-Damgard Revisited: How to Construct a Hash Function," Proceeding of Annual International Conference on Advances in Cryptology, pp. 430-448, 2005.
|