共 15 条
[1]
Mollah M.B., Et al., Blockchain for the internet of vehicles towards intelligent transportation systems: A survey, Ieee Internet of Things J., 8, 6, pp. 4157-4185, (2021)
[2]
Ul Hassan N., Yuen C., Niyato D., Blockchain technologies for smart energy systems: Fundamentals, challenges, and solutions, Ieee Industrial Electronics Mag., 13, 4, pp. 106-118, (2019)
[3]
Cheng S., Et al., Traffi c-Aware patching for cyber security in mobile iot, Ieee Commun. Mag., 55, 7, pp. 29-35, (2017)
[4]
Pa Y.M.P., Et al., Iotpot: Analysing the rise of iot compromises, Proc. 9th Usenix Wksp. Off Ensive Technologies, (2015)
[5]
Ronen E., Shamir A., Extended functionality attacks on iot devices: The case of smart lights, Proc. 2016 Ieee Euro. Symp. Security and Privacy, pp. 3-12, (2016)
[6]
Aman M.N., Et al., Hatt: Hybrid remote attestation for the internet of things with high availability, Ieee Internet of Things J., 7, 8, pp. 7220-7233, (2020)
[7]
Aman M.N., Basheer M.H., Sikdar B., Two-factor authentication for iot with location information, Ieee Internet of Things J., 6, 2, pp. 3335-3351, (2019)
[8]
Aman M.N., Sikdar B., Att-Auth: A hybrid protocol for industrial iot attestation with authentication, Ieee Internet of Things J., 5, 6, pp. 5119-5131, (2018)
[9]
Chen N., Okada M., Towards 6g internet of things and the convergence with rof system, Ieee Internet of Things J, pp. 1-1, (2020)
[10]
Peng S., Yu S., Yang A., Smartphone malware and its propagation modeling: A survey, Ieee Commun. Surveys & Tutorials, 16, 2, pp. 925-941, (2014)