Author:
Mallik Puspanjali,Jena Om Prakash
Reference29 articles.
1. Sadique, K.M., Rahmani, R., Johannesson, P.: Towards security on Internet of Things: applications and challenges in technology. In: The 9th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2018), Procedia Computer Science 141, pp. 199–206 (2018)
2. El-hajj, M., Fadlallah, A., Chamoun, M., Serhrouchni, A.: A survey of Internet of Things (IoT) authentication schemes. In: MDPI (2019)
3. Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the Internet of Things
4. Gope, P., Sikdar, B.: Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. (2018)
5. Yuan, J., Li, X.: A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6 (2018)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A comprehensive review of cybersecurity perspective for Wireless Sensor Networks;2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT);2022-10-20