共 52 条
- [11] Dutta S., Chukkapalli S.S.L., Sulgekar M., Krithivasan S., Das P.K., Joshi A., Et al., Context sensitive access control in smart home environments, 6Th IEEE International Conference on Big Data Security on Cloud (Bigdatasecurity 2020), (2020)
- [12] Gamundani A.M., Phillips A., Muyingi H.N., An overview of potential authentication threats and attacks on internet of things (IoT): A focus on smart home applications, 2018 IEEE International Conference on Internet of Things (Ithings) and IEEE Green Computing and Communications (Greencom) and IEEE Cyber, Physical and Social Computing (Cpscom) and IEEE Smart Data (Smartdata)., pp. 50-57, (2018)
- [13] Ghosh N., Chandra S., Sachidananda V., Elovici Y., SoftAuthZ: a context-aware, behavior-based authorization framework for home IoT, IEEE Internet Things J, 6, 6, pp. 10773-10785, (2019)
- [14] Gomez C., Chessa S., Fleury A., Roussos G., Preuveneers D., Internet of things for enabling smart environments: a technology-centric perspective, J Ambient Intell Smart Environ, 11, 1, pp. 23-43, (2019)
- [15] Guth J., Breitenbucher U., Falkenthal M., Fremantle P., Kopp O., Leymann F., Reinfurt L., A detailed analysis of IoT platform architectures: Concepts, similarities, and differences, Internet of Everything, pp. 81-101, (2018)
- [16] Hakak S., Khan W.Z., Gilkar G.A., Imran M., Guizani N., Securing smart cities through blockchain technology: architecture, requirements, and challenges, IEEE Netw, 34, 1, pp. 8-14, (2020)
- [17] Han J.-H., Jeon Y.S., Kim J.N., Security considerations for secure and trustworthy smart home system in the IoT environment, 2015 International Conference on Information and Communication Technology Convergence, pp. 1116-1118, (2015)
- [18] Jiang H., Cai C., Ma X., Yang Y., Liu J., Smart home based on WiFi sensing: a survey, IEEE Access, 6, pp. 13317-13325, (2018)
- [19] Kong H., Lu L., Yu J., Chen Y., Tang F., Continuous authentication through finger gesture interaction for smart homes using WiFi, IEEE Trans Mob Comput, (2020)
- [20] Kumari S., Khan M.K., Atiquzzaman M., User authentication schemes for wireless sensor networks: a review, Ad Hoc Netw, 27, pp. 159-194, (2015)