44
Views
1
CrossRef citations to date
0
Altmetric
Articles

Study and analysis of key generation techniques in internet of things

, &

References

  • Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang and Lei Shu “Authentication Protocols for Internet of Things: A Comprehensive Survey”, Hindawi, 2017, Pp 1-42.
  • Agiwal, Mamta, Navrati Saxena, and Abhishek Roy. “Towards connected living: 5g enabled internet of things (iot).” IETE Technical Review 36.2 (2019): 190-202. doi: 10.1080/02564602.2018.1444516
  • Li, Chung-Sheng, Frederica Darema, and Victor Chang. “Distributed behavior model orchestration in cognitive internet of things solution.” Enterprise Information Systems 12.4 (2018): 414-434. doi: 10.1080/17517575.2017.1355984
  • Hajiheidari, Somayye, Karzan Wakil, Maryam Badri, and Nima Jafari Navimipour. “Intrusion detection systems in the Internet of things: A comprehensive investigation.” Computer Networks (2019).
  • Tie Qiu “Self-organizing and smart protocols for heterogeneous Ad Hoc Networks in the Internet of Things”, Ad Hoc Networks, 2017, Pp 1-2.
  • Jun Zhou, Zhenfu Cao, Xiaolei Dong and Athanasios V. Vasilakos “Security and Privacy for Cloud-Based IoT: Challenges, Countermeasures, and Future Directions”, IEEE, 2017, Pp 26-33.
  • Prem Prakash Jayaraman, Xuechao Yang, Ali Yavari, Dimitrios Georgakopoulos and Xun Yi “Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation”, Future Generation Computer Systems, 2017, Pp 1-10.
  • Engin Leloglu “A Review of Security Concerns in Internet of Things”, Journal of Computer and Communications, 2017, Pp 121-136. doi: 10.4236/jcc.2017.51010
  • Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang and Wade Trappe “A Security Framework for the Internet of Things in the Future Internet Architecture”, Future Internet, 2017, Pp 1-28.
  • Behrouz Pourghebleh and Nima Jafari Navimipour “Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research”, Journal of Network and Computer Applications, 2017, Pp 23-34. doi: 10.1016/j.jnca.2017.08.006
  • Soumya Ranjan Moharana, Vijay Kumar Jha, Anurag Satpathy, Sourav Kanti Addya, Ashok Kumar Turuk and Banshidhar Majhi “Secure Key-distribution in IoT Cloud Networks”, IEEE, 2017, Pp 197-202.
  • U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, 1993. doi: 10.1109/18.256484
  • Bilal Javed, Mian Waseem Iqbal and Haider Abbas “Internet of Things (IoT) Design Considerations for Developers and Manufacturers”, IEEE, 2017, Pp 1-7.
  • Kumar, Ankit, et al. “An enhanced quantum key distribution protocol for security authentication.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 499-507. doi: 10.1080/09720529.2019.1637154
  • Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo and Minho Jo “Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts”, IEEE, 2017, Pp 3273-3283.
  • Diego Mendez, Ioannis Papapanagiotou and Baijian Yang “Internet of Things: Survey on Security and Privacy”, arXiv, 2017, Pp 1-16.
  • Martin Henze, Benedikt Wolters, Roman Matzutt,Torsten Zimmermann and Klaus Wehrle “Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things”, IEEE, 2017, Pp 1-8.
  • Kumar, Ankit, et al. “An improved quantum key distribution protocol for verification.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 491-498. doi: 10.1080/09720529.2019.1637153
  • Junqing Zhang, Trung Q. Duong, Alan Marshall and Roger Woods “Key Generation from Wireless Channels: A Review”, IEEE, 2016, Pp 1-12.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.