Publisher
Springer Nature Switzerland
Reference35 articles.
1. Shaikh, E., Mohiuddin, I., Manzoor, A.: Internet of things (IoT): security and privacy threats. In: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6. IEEE (2019)
2. Tawalbeh, L., Muheidat, F., Tawalbeh, M., Quwaider, M., et al.: IoT Privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)
3. Zhou, Z., Dong, M., Ota, K., Wang, G., Yang, L.T.: Energy-efficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks. IEEE Internet Things J. 3(3), 428–438 (2015)
4. 3rd Generation Partnership Project: Technical specification group services and system aspects; proximity-based services (Prose); (Release 15), 3GPP TS23.303 (2018)
5. Shang, Z., Ma, M., Li, X.: A certificateless authentication protocol for D2D group communications in 5G cellular networks. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–7. IEEE (2019)