标题
TRUTH: Trust and Authentication Scheme in 5G-IIoT
作者
关键词
-
出版物
IEEE Transactions on Industrial Informatics
Volume 19, Issue 1, Pages 880-889
出版商
Institute of Electrical and Electronics Engineers (IEEE)
发表日期
2022-05-13
DOI
10.1109/tii.2022.3174718
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network
- (2021) Baohe Pang et al. IEEE Wireless Communications Letters
- PACMAN: Privacy-Preserving Authentication Scheme for Managing Cybertwin-Based 6G Networking
- (2021) Seyed Ahmad Soleymani et al. IEEE Transactions on Industrial Informatics
- Edge Computing-Based Security Framework for Big Data Analytics in VANETs
- (2019) Sahil Garg et al. IEEE NETWORK
- Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
- (2018) Jangirala Srinivas et al. IEEE Transactions on Dependable and Secure Computing
- Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
- (2018) Prosanta Gope et al. IEEE Transactions on Information Forensics and Security
- A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
- (2018) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT)
- (2018) Mohammad Dahman Alshehri et al. MOBILE NETWORKS & APPLICATIONS
- Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
- (2018) Mohammad Wazid et al. IEEE Internet of Things Journal
- Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment
- (2018) Ashok Kumar Das et al. IEEE Internet of Things Journal
- Communication and Data Trust for Wireless Sensor Networks Using D–S Theory
- (2017) Vijender Busi Reddy et al. IEEE SENSORS JOURNAL
- Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
- (2017) Mohammad Wazid et al. IEEE Transactions on Dependable and Secure Computing
- A Trust Model Based on Cloud Theory in Underwater Acoustic Sensor Networks
- (2017) Jinfang Jiang et al. IEEE Transactions on Industrial Informatics
- A Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things
- (2017) Xiong Li et al. IEEE Transactions on Industrial Informatics
- Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model
- (2017) Qi Xie et al. IEEE Transactions on Information Forensics and Security
- Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
- (2017) Sravani Challa et al. IEEE Access
- Chaotic Map-based Anonymous User Authentication Scheme with User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
- (2017) Sandip Roy et al. IEEE Internet of Things Journal
- ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks
- (2016) Wenjia Li et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
- (2016) Qi Jiang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An Efficient Distributed Trust Model for Wireless Sensor Networks
- (2015) Jinfang Jiang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks
- (2012) Daojing He et al. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started