1 |
H. Mrabet, S. Belguith, A. Alhomoud, and A. Jemai, "A survey of IoT security based on a layered architecture of sensing and data analysis," Sensors, vol. 20, no. 13, pp. 1-19, 2020.
DOI
|
2 |
W. Sun, Z. Cai, Y. Li, F. Liu, S. Fang, and G. Wang, "Security and Privacy in the Medical Internet of Things : A Review," Secur. Commun. Networks, pp. 1-9, 2018.
|
3 |
J. J. Hathaliya and S. Tanwar, "An exhaustive survey on security and privacy issues in Healthcare 4 . 0," Comput. Commun., vol. 153, pp. 311-335, 2020.
DOI
|
4 |
A. Kumar, S. Zeadally, and D. He, "Taxonomy and analysis of security protocols for Internet of Things," Futur. Gener. Comput. Syst., vol. 89, pp. 110-125, 2018.
DOI
|
5 |
C. Guo, P. Tian, and K.-K. R. Choo, "Enabling Privacy-assured Fog-based Data Aggregation in Ehealthcare Systems," IEEE Trans. Ind. Informatics, vol. 17, no. 3, pp. 1948-1957, 2020.
|
6 |
Y. Sun, H. Zhu, and X. Feng, "A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection," vol. 19, no. 3, pp. 371-382, 2017.
|
7 |
A. Ullah, M. Azeem, H. Ashraf, A. Alaboudi .A, M. Humayun, and N. Z. Jhanjhi, "Secure Healthcare Data Aggregation and Transmission in IoT - A Survey," IEEE Access, vol. 9, pp. 16849-16865, 2021.
DOI
|
8 |
J. Singh, R. Kaur, and D. Singh, "A survey and taxonomy on energy management schemes in wireless sensor networks," J. Syst. Archit., vol. 111, pp. 1-22, 2020.
|
9 |
J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications," IEEE Internet Things J., vol. 4, no. 5, pp. 1125-1142, 2017.
DOI
|
10 |
S. Al-Janabi, I. Al-Shourbaji, M. Shojafar, and S. Shamshirband, "Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications," Egypt. Informatics J., vol. 18, no. 2, pp. 113-122, 2017.
DOI
|
11 |
A. Ara, M. Al-Rodhaan, Y. Tian, and A. Al-Dhelaan, "A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems," IEEE Access, vol. 5, pp. 12601-12617, 2017.
DOI
|
12 |
H. Zhong, L. Shao, J. Cui, and Y. Xu, "An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks," J. Parallel Distrib. Comput., vol. 111, pp. 1-12, 2018.
DOI
|
13 |
H. Ahmadi, G. Arji, L. Shahmoradi, R. Safdari, M. Nilashi, and M. Alizadeh, "The application of internet of things in healthcare: a systematic literature review and classification," Univers. Access Inf. Soc., vol. 18, pp. 837-869, 2018.
DOI
|
14 |
S. Chiou and C. Lin, "An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment," Secur. Commun. Networks, vol. 2018, pp. 1-15, 2018.
|
15 |
X. Li, S. Liu, F. Wu, S. Kumari, and J. J. P. C. Rodrigues, "Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications," IEEE Internet Things J., vol. 6, no. 3, pp. 4755-4763, 2019.
DOI
|
16 |
J. O. Kwon, I. R. Jeong, and D. H. Lee, "Practical Password-Authenticated Three-Party Key Exchange," KSII Trans. Internet Inf. Syst., vol. 2, no. 6, pp. 977-980, 2008.
|
17 |
C. Lu, "Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment," KSII Trans. Internet Inf. Syst., vol. 9, no. 12, pp. 5135-5149, 2015.
DOI
|
18 |
N. Alhirabi, O. Rana, and C. Perera, "Security and privacy requirements for the Internet of Things : A survey," ACM Trans. Internet Things, vol. 2, no. 1, pp. 1-37, 2021.
|
19 |
X. Shen, L. Zhu, C. Xu, K. Sharif, and R. Lu, "A privacy-preserving data aggregation scheme for dynamic groups in fog computing," Inf. Sci. (Ny)., vol. 514, pp. 118-130, 2020.
DOI
|
20 |
X. Jia and D. He, "Authenticated key agreement scheme for fog-driven IoT healthcare system," Wirel. Networks, vol. 25, pp. 4737-4750, 2018.
DOI
|
21 |
O. R. Merad Boudia, S. M. Senouci, and M. Feham, "Secure and efficient verification for data aggregation in wireless sensor networks," Int. J. Netw. Manag., vol. 28, no. 1, pp. 1-17, 2018.
|
22 |
M. Farash, Sabzinejad, M. Attari, Ahmadian, and S. Kumari, "Cryptanalysis and improvement of a three- party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps," Int. J. Commun. Syst., vol. 30, no. 1, pp. 1-10, 2014.
|
23 |
J. Gowthami, "Secure Three-Factor Remote user Authentication for E-Governance of Smart Cities," 2018 Int. Conf. Curr. Trends Towar. Converging Technol., no. May, pp. 1-8, 2019.
|
24 |
X. Li, M. H. Ibrahim, S. Kumari, A. K. Sangaiah, V. Gupta, and K. K. R. Choo, "Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks," Comput. Networks, vol. 129, pp. 429-443, 2017.
DOI
|
25 |
H. Liu, X. Yao, T. Yang, and H. Ning, "Cooperative privacy preservation for wearable devices in hybrid computing-based smart health," IEEE Internet Things J., vol. 6, no. 2, pp. 1352-1362, 2018.
DOI
|
26 |
M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo, "Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks," IEEE Internet Things J., vol. 5, no. 1, pp. 269-282, 2018.
DOI
|
27 |
M. Wazid and S. Member, "A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things," IEEE Access, vol. 8, no. 1, pp. 88700-88716, 2020.
DOI
|