1 |
YOON, Seokung; PARK, Haeryong; YOO, Hyeong Seon. Security issues on smarthome in IoT environment. In: Computer science and its applications. Springer, Berlin, Heidelberg, pp. 691-696, 2015. DOI: https://doi.org/10.1007/978-3-662-45402-2_97
|
2 |
ROBLES, Rosslin John, et al. A review on security in smart home development. International Journal of Advanced Science and Technology, 2010.
|
3 |
KOMNINOS, Nikos; PHILIPPOU, Eleni; PITSILLIDES, Andreas. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials, 16.4: 1933-1954, 2014. DOI: https://doi.org/10.1109/comst.2014.2320093
DOI
|
4 |
FERNANDES, Earlence; JUNG, Jaeyeon; PRAKASH, Atul. Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP). IEEE, pp. 636-654, 2016. DOI: https://doi.org/10.1109/sp.2016.44
|
5 |
MOWAD, Mohamed Abd El-Latif; FATHY, Ahmed; HAFEZ, Ahmed. Smart home automated control system using android application and microcontroller. International Journal of Scientific & Engineering Research, 5.5: 935-939, 2014.
|
6 |
SCHNEPS-SCHNEPPE, Manfred, et al. Wired Smart Home: energy metering, security, and emergency issues. In: Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2012 4th International Congress on. IEEE, pp. 405-410, 2012. DOI: https://doi.org/10.1109/icumt.2012.6459700
|
7 |
MANTAS, Georgios; LYMBERO POULOS, Dimitrios; KOMNINOS, Nikos. Security in smart home environment. In: Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications. IGI Global, pp. 170-191, 2011. DOI: https://doi.org/10.4018/978-1-61520-805-0.ch010
|
8 |
FADELL, Anthony Michael, et al. Handling security services visitor at a smart-home. U.S. Patent Application No 14/587,835, 2015.
|
9 |
SIVARAMAN, Vijay, et al. Network-level security and privacy control for smart-home IoT devices. In: Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on. IEEE, pp. 163-167, 2015. DOI: https://doi.org/10.1109/wimob.2015.7347956
|
10 |
YE, Xiaojing; HUANG, Junwei. A framework for cloud-based smart home. In: Computer science and network technology (ICCSNT), 2011 international conference on. IEEE, pp. 894-897. 2011. DOI: https://doi.org/10.1109/iccsnt.2011.6182105
|
11 |
JOSE, Arun Cyril; MALEKIAN, Reza. Smart home automation security. SmartCR, 5.4: 269-28, 2015. DOI: https://doi.org/10.6029/smartcr.2015.04.004
|
12 |
J.Zhu and J.Ma, A new authentication scheme with anonymity for wireless environments, IEEE Transactions on Communications, Vol. 50, No.1, pp.231-235, 2004. DOI: https://doi.org/10.1109/tce.2004.1277867
|
13 |
Farash, Mohammad Sabzinejad, Turkanovic Muhamed, Kumari Saru, and Marko Holbl. "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment." Ad Hoc Networks 36 152-176, 2016. DOI: https://doi.org/10.1016/j.adhoc.2015.05.014
DOI
|
14 |
C.-C.Wu, W.-B.Lee, and W.-J.Tsaur," A secure authentication scheme with anonymity for wireless communications", IEEE Communications Letters,Vol. 12, No.10, pp.722-723, 2008. DOI: https://doi.org/10.1109/lcomm.2008.080283
DOI
|
15 |
Qinghua Li and Guohong Cao, "Multicast Authentication in the Smart Grid With One-Time Signature", IEEE Transactions on Smart Grid, 2(4), 2011. DOI: https://doi.org/10.1109/tsg.2011.2138172
|