Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 3
Page No. 951 - 959

LA-Based Approach for IoT Security

Authors : Seyed MahmoodHashemi

References

Abomhara, M. and G.M. Koien, 2014. Security and privacy in the internet of things: Current status and open issues. Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS), May 11-14, 2014, IEEE, Aalborg, Denmark, ISBN:978-1-4799-4630-3, pp: 1-8.

Alcaide, A., E. Palomar, J. Montero-Castillo and A. Ribagorda, 2013. Anonymous authentication for privacy-preserving IoT target-driven applications. Comput. Secur., 37: 111-123.
CrossRef  |  Direct Link  |  

Bose, T., S. Bandyopadhyay, A. Ukil, A. Bhattacharyya and A. Pal, 2015. Why not keep your personal data secure yet private in IoT?: Our lightweight approach. Proceedings of the 2015 IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP’15), April 7-9, 2015, IEEE, Singapore, ISBN:978-1-4799-8054-3, pp: 1-6.

Curilem, S.G., A.R. Barbosa and F.M. De Azevedo, 2007. Intelligent tutoring systems: Formalization as automata and interface design using neural networks. Comput. Educ., 49: 545-561.
CrossRef  |  Direct Link  |  

Durisic, M.P., Z. Tafa, G. Dimic and V. Milutinovic, 2012. A survey of military applications of wireless sensor networks. Proceedings of the 2012 Mediterranean Conference on Embedded Computing (MECO’12), June 19-21, 2012, IEEE, Bar, Montenegro, ISBN:978-1-4673-2366-6, pp: 196-199.

Furtado, H. and R. Trobec, 2011. Applications of wireless sensors in medicine. Proceedings of the 34th International Conference on Convention MIPRO 2011, May 23-27, 2011, IEEE, Opatija, Croatia, ISBN:978-1-4577-0996-8, pp: 257-261.

Ge, H., Y. Wang, S. Li, C.L.P. Chen and Y. Guo, 2016. A cooperative framework of learning automata and its application in tutorial-like system. Neurocomput., 188: 311-318.
CrossRef  |  Direct Link  |  

Hussain, M.A. and K.K. Sup, 2009. WSN research activities for military application. Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT’09) Vol. 1, February 15-18, 2009, IEEE, Phoenix Park, South Korea, ISBN:978-89-5519-138-7, pp: 271-274.

Krishna, P.V., S. Misra, V. Saritha, H. Agarwal and N. Chilamkurti, 2013. Learning automata-based virtual backoff algorithm for efficient medium access in vehicular ad hoc networks. J. Syst. Archit., 59: 968-975.
CrossRef  |  Direct Link  |  

Kumar, N., R. Iqbal, S. Misra and J.J. Rodrigues, 2015. An intelligent approach for building a secure decentralized public key infrastructure in VANET. J. Comput. Syst. Sci., 81: 1042-1058.
CrossRef  |  Direct Link  |  

Li, L., 2012. Study on security architecture in the internet of things. Proceedings of the 2012 International Conference on Measurement, Information and Control (MIC’12) Vol. 1, May 18-20, 2012, IEEE, Harbin, China, ISBN:978-1-4577-1601-0, pp: 374-377.

Nazareth, D.L. and J. Choi, 2015. A system dynamics model for information security management. Inf. Manage., 52: 123-134.
CrossRef  |  Direct Link  |  

Nehme, R.V., E.A. Rundensteiner and E. Bertino, 2008. A security punctuation framework for enforcing access control on streaming data. Proceedings of the 2008 IEEE 24th International Conference on Data Engineering (ICDE’08), April 7-12 2008, IEEE, Cancun, Mexico, ISBN:978-1-4244-1836-7, pp: 406-415.

Ojamaa, A., E. Tyugu and J. Kivimaa, 2008. Pareto-optimal situaton analysis for selection of security measures. Proceedings of the 2008 IEEE International Conference on Military Communications (MILCOM’08), November 16-19, 2008, IEEE, San Diego, California, USA., ISBN:978-1-4244-2676-8, pp: 1-7.

Palattella, M.R., N. Accettura, L.A. Grieco, G. Boggia and M. Dohler et al., 2013. On optimal scheduling in duty-cycled industrial IoT applications using IEEE802.15.4e TSCH. IEEE. Sens. J., 13: 3655-3666.
CrossRef  |  Direct Link  |  

Pohls, H.C., V. Angelakis, S. Suppan, K. Fischer and G. Oikonomou et al., 2014. RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects. Proceedings of the 2014 IEEE Workshops on Wireless Communications and Networking Conference (WCNCW’14), April 6-9, 2014, IEEE, Istanbul, Turkey, ISBN:978-1-4799-3086-9, pp: 122-127.

Potter, C.H., G.P. Hancke and B.J. Silva, 2013. Machine-to-machine: Possible applications in industrial networks. Proceedings of the 2013 IEEE International Conference on Industrial Technology (ICIT’13), February 25-28, 2013, IEEE, Cape Town, South Africa, ISBN:978-1-4673-4567-5, pp: 1321-1326.

Rahman, N.H.A. and K.K.R. Choo, 2015. A survey of information security incident handling in the cloud. Comput. Secur., 49: 45-69.
CrossRef  |  Direct Link  |  

Saha, S. and M. Matsumoto, 2007. A framework for disaster management system and WSN protocol for rescue operation. Proceedings of the 2007 IEEE Region 10 Conference on TENCON, October 30-November 2, 2007, IEEE, Taipei, Taiwan, ISBN:978-1-4244-1271-6, pp: 1-4.

Schurgot, M.R., D.A. Shinberg and L.G. Greenwald, 2015. Experiments with security and privacy in IoT networks. Proceedings of the 2015 IEEE 16th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’15), June 14-17, 2015, IEEE, Boston, Massachusetts, ISBN:978-1-4799-8461-9, pp: 1-6.

Torkestani, J.A. and M.R. Meybodi, 2010. An intelligent backbone formation algorithm for wireless ad hoc networks based on distributed learning automata. Comput. Networks, 54: 826-843.
CrossRef  |  

Unger, S. and D. Timmermann, 2015. DPWSec: Devices profile for web services security. Proceedings of the 2015 IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP’15), April 7-9, 2015, IEEE, Singapore, ISBN:978-1-4799-8055-0, pp: 1-6.

Xu, T., J.B. Wendt and M. Potkonjak, 2014. Security of IoT systems: Design challenges and opportunities. Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, November 03-06, 2014, IEEE, San Jose, California, USA., ISBN:978-1-4799-6277-8, pp: 417-423.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved