References

ROBUST DATA SECURITY FRAMEWORK FOR IOT NETWORK USING INTEGRATED TECHNIQUES


[1] B. Anggorojati, P. N. Mahalle, N. R. Prasad and R. Prasad, Capability-based access control delegation model on the federated IoT network, In: IEEE 15th International Symposium on Wireless Personal Multimedia Communications (2012), 604-608.

[2] L. Atzori, A. Iera and G Morabito, The internet of things: A survey, Computer Networks 54(15) (2010), 2787-2805.
DOI: https://doi.org/10.1016/j.comnet.2010.05.010

[3] M. Bellare, J. Kilian and P. Rogaway, The security of the cipher block chaining message authentication code, Journal of Computer and System Sciences 61(3) (2000), 362-399.
DOI: https://doi.org/10.1006/jcss.1999.1694

[4] S. Chakrabarty and D. W. Engels, A secure IoT architecture for smart cities, IEEE Annual Consumer Communications & Networking Conference, 2016.
DOI: https://doi.org/10.1109/CCNC.2016.7444889

[5] M. Tao, K. Ota, M. Dong and Z. Qian, AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks, Journal of Parallel and Distributed Computing 118(1) (2018), 107-117.
DOI: https://doi.org/10.1016/j.jpdc.2017.09.004

[6] Fadele A. Alaba, M. Othman, I. A. T. Hashem and F. Alotaibi, Internet of things security: A survey, Journal of Network and Computer Applications 88 (2017), 10-28.
DOI: https://doi.org/10.1016/j.jnca.2017.04.002

[7] Z. Gu, G. Han, H. Zeng and Q. Zhao, Security-aware mapping and scheduling with hardware co-processors for flexray-based distributed embedded systems, IEEE Transactions on Parallel and Distributed Systems 27(10) (2016), 3044-3057.
DOI: https://doi.org/10.1109/TPDS.2016.2520949

[8] Z. Guan, Y. Zhang, L. Wu, J. Wu, J. Li, Y. Ma and J. Hu, APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT, Journal of Network and Computer Applications 125 (2019), 82-92.
DOI: https://doi.org/10.1016/j.jnca.2018.09.019

[9] B. Yigit, G. Gür, F. Alagöz and B. Tellenbach, Cost-aware securing of IoT systems using attack graphs, Ad Hoc Networks 86 (2019), 23-35.
DOI: https://doi.org/10.1016/j.adhoc.2018.10.024

[10] G. Zhou, H. Michalik and L. Hinsenkamp, Efficient and high-throughput implementations of AES-GCM on FPGAs, Proceedings of International Conference on Field Programmable Technology (2007), 185-192.
DOI: https://doi.org/10.1109/FPT.2007.4439248

[11] Y. Hori, A. Satoh, H. Sakane and K. Toda, Bitstream encryption and authentication using AES-GCM in dynamically reconfigurable systems, National Institute of Advanced Industrial Science and Technology (AIST), Advances in Information and Computer Security, Proceeding 53(12) (2012), 261-278.
DOI: https://doi.org/10.1007/978-3-540-89598-5_18

[12] Y. Jararweh, M. Al-Ayyoub, A. Darabseh, E. Benkhelifa, M. Vouk and A. Rindos, SDIoT: A software defined based internet of things framework, Journal of Ambient Intelligence and Humanized Computing 6(4) (2015), 453-461.
DOI: https://doi.org/10.1007/s12652-015-0290-y

[13] D. Jayasinghe, R. Ragel, J. A. Ambrose, A. Ignjatovic and S. Parameswaran, Advanced modes in AES: Are they safe from power analysis based side channel attacks?, IEEE International Conference on Computer Design, 2014.
DOI: https://doi.org/10.1109/ICCD.2014.6974678

[14] J. Kim, Secure and efficient management architecture for the internet of things, SenSys ’15: Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems (2015), 499-500.
DOI: https://doi.org/10.1145/2809695.2822522

[15] M. S. Kim, S. R. Kim, J. Kim and Y. Yoo, Design and implementation of MAC protocol for SmartGrid HAN environment, Proceedings - 11th IEEE International Conference on Computer and Information Technology (2011), 212-217.
DOI: https://doi.org/10.1109/CIT.2011.78

[16] H. Jiang, F. Shen, S. Chen, K.-C. Li and Y.-S. Jeong, A secure and scalable storage system for aggregate data in IoT, Future Generation Computer Systems 49 (2014), 133-141.
DOI: https://doi.org/10.1016/j.future.2014.11.009

[17] T. Li, C. Gao, L. Jiang, W. Pedrycz and J. Shen, Publicly verifiable privacy-preserving aggregation and its application in IoT, Journal of Network and Computer Applications 126 (2019), 39-44.
DOI: https://doi.org/10.1016/j.jnca.2018.09.018

[18] O. Mavropoulos, H. Mouratidis, A. Fish and E. Panaousis, Apparatus: A framework for security analysis in internet of things systems, Ad Hoc Networks 92 (2019); Article 101743.
DOI: https://doi.org/10.1016/j.adhoc.2018.08.013

[19] S. R. Moosavi, T. N. Gia, A. M. Rahmani, E. Nigussie, S. Virtanen, J. Isoaho and H. Tenhunen, SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways, Procedia Computer Science 52 (2015), 452-459.
DOI: https://doi.org/10.1016/j.procs.2015.05.013

[20] P. M. Pawar, R. H. Nielsen, N. R. Prasad, S. Ohmori and R. Prasad, Behavioural modelling of WSN MAC Layer Security Attacks: A sequential UML approach, Journal of Cyber Security and Mobility 1(1) (2012), 65-82.

[21] C. Perera, A. Zaslavsky, P. Christen and D. Georgakopoulos, Context aware computing for the internet of things: A survey, IEEE Communications Surveys and Tutorials 16(1) (2014), 414-454.
DOI: https://doi.org/10.1109/SURV.2013.042313.00197

[22] R. H. Randhawa, A. Hameed and A. N. Mian, Energy efficient cross-layer approach for object security of CoAP for IoT devices, Ad Hoc Networks 92 (2019); Article 101761.
DOI: https://doi.org/10.1016/j.adhoc.2018.09.006

[23] S. Sankaran, Lightweight security framework for IoTs using identity based cryptography, In 2016 International Conference on Advances in Computing, Communications and Informatics, Sept. 21-24, 2016, Jaipur, India (pp. 880-886).
DOI: https://doi.org/10.1109/ICACCI.2016.7732156

[24] S. Sicari, A. Rizzardi, D. Miorandi, C. Cappiello and A. Coen-Porisini, A secure and quality-aware prototypical architecture for the internet of things, Information Systems 58 (2016), 43-55.
DOI: https://doi.org/10.1016/j.is.2016.02.003

[25] J. Srinivas, S. Mukhopadhyay and D. Mishra, Secure and efficient user authentication scheme for multi-gateway wireless sensor networks, Ad Hoc Networks 54 (2017), 147-169.
DOI: https://doi.org/10.1016/j.adhoc.2016.11.002

[26] A. L. V. Caraguay, A. B. Peral, L. I. B. López and L. J. G. Villalba, SDN: Evolution and opportunities in the development IoT applications, International Journal of Distributed Sensor Networks 10(5) (2014), 1-10.
https://doi.org/10.1155/2014/735142

[27] Yue Qiu and Maode Ma, A mutual authentication and key establishment scheme for M2M communication in 6LoWPAN, IEEE Transactions on Industrial Informatics 12(6) (2016), 2074-2085.
DOI: https://doi.org/10.1109/TII.2016.2604681