Hardware low power implementation of attribute-based encryption, 28th International Conference on Microelectronics (ICM), pp.273-276, 2016. ,
Secure ubiquitous house and facility control solution, 2010 Fifth International Conference on Internet and Web Applications and Services, pp.262-267, 2010. ,
Home appliances control using mobile phone, 2015 International Conference on Advances in Electrical Engineering (ICAEE), pp.251-254, 2015. ,
A survey on mobile edge computing, 10th International Conference on Intelligent Systems and Control (ISCO), pp.1-8, 2016. ,
Internet of things : A survey on enabling technologies, protocols, and applications, IEEE Communications Surveys & Tutorials, vol.17, issue.4, pp.2347-2376, 2015. ,
On resilience of wireless mesh routing protocol against dos attacks in iot-based ambient assisted living applications, 17th International Conference on E-health Networking, pp.205-210, 2015. ,
Anonymous authentication for privacy-preserving iot target-driven applications, Computers & Security, vol.37, pp.111-123, 2013. ,
Blockstack : A global naming and storage system secured by blockchains, USENIX Annual Technical Conference, pp.181-194, 2016. ,
On the feasibility of attributebased encryption on smartphone devices, Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, pp.49-54, 2015. ,
Blockchain-based architectures for the internet of things : A survey, 2017. ,
Mitigating crossfire attacks using sdn-based moving target defense, 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp.627-630, 2016. ,
Blockchain platform for industrial internet of things, Journal of Software Engineering and Applications, vol.9, issue.10, p.533, 2016. ,
Talking to strangers : Authentication in ad-hoc wireless networks, NDSS. Citeseer, 2002. ,
Hierarchical trust management for wireless sensor networks and its applications to trustbased routing and intrusion detection, IEEE Trans. on network and service management, vol.9, issue.2, pp.169-183, 2012. ,
Ciphertext-policy attributebased encryption, IEEE Symposium on Security and Privacy, 2007. SP'07, pp.321-334, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-01788815
Ciphertext-policy attributebased encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-01788815
Securing smart cities using blockchain technology, IEEE 18th International Conference on High References, p.117, 2016. ,
, Performance Computing and Communications, IEEE 14th International Conference on Smart City ; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp.1392-1393, 2016.
An optimal class of symmetric key generation systems, Workshop on the Theory and Application of of Cryptographic Techniques, pp.335-338, 1984. ,
Identity-based encryption from the weil pairing, Annual International Cryptology Conference, pp.213-229, 2001. ,
Fog computing and its role in the internet of things, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, pp.13-16, 2012. ,
Cloudlets authentication in nfc-based mobile computing, 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, pp.267-272, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01126390
Sdn security considerations in the data center, 2013. ,
Data tagging for new information governance models, IEEE Security Privacy, vol.8, issue.5, pp.64-68, 2010. ,
Tendermint : Byzantine fault tolerance in the age of blockchains, 2016. ,
Flow based security for iot devices using an sdn gateway, IEEE 4th International Conference on Future Internet of Things and Cloud Future Internet of Things and Cloud (FiCloud), pp.157-163, 2016. ,
, Blockchain consensus protocols in the wild, 2017.
Research challenges for the security of control systems, HotSec, 2008. ,
Practical byzantine fault tolerance, OSDI, vol.99, pp.173-186, 1999. ,
Random key predistribution schemes for sensor networks, Proceedings. 2003 Symposium on Security and Privacy, pp.197-213, 2003. ,
Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices, 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), pp.715-720, 2011. ,
Trm-iot : A trust management model based on fuzzy reputation for internet of things, Comput. Sci. Inf. Syst, vol.8, issue.4, pp.1207-1228, 2011. ,
Trust management for encounter-based routing in delay tolerant networks, IEEE Global Telecommunications Conf. GLOBECOM, pp.1-6, 2010. ,
Trust-based service management for social internet of things systems, IEEE Trans. on Dependable and Secure Computing, vol.13, issue.6, pp.684-696, 2016. ,
On the computation offloading at ad hoc cloudlet : architecture and service modes, IEEE Communications Magazine, vol.53, issue.6, pp.18-24, 2015. ,
Trust management for soa-based iot and its application to service composition, IEEE Trans. on Services Computing, vol.9, issue.3, pp.482-495, 2016. ,
An ibe-based security scheme on internet of things, Cloud Computing and Intelligent Systems (CCIS), vol.3, pp.1046-1049, 2012. ,
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks, Int. Conf. on Computational Science and Engineering, vol.2, pp.641-650, 2009. ,
The best keying protocol for sensor networks, Pervasive and Mobile Computing, vol.9, issue.4, pp.564-571, 2013. ,
Blockchains and smart contracts for the internet of things, IEEE Access, vol.4, pp.2292-2303, 2016. ,
Blockchains and smart contracts for the internet of things, vol.4, pp.2292-2303, 2016. ,
An identity based encryption scheme based on quadratic residues, IMA International Conference on Cryptography and Coding, pp.360-363, 2001. ,
Incentives build robustness in bittorrent, Workshop on Economics of Peer-to-Peer systems, vol.6, pp.68-72, 2003. ,
Blockchain for the internet of things : a systematic literature review, pp.1-6, 2016. ,
Identifying dos and ddos attack origin : Ip traceback methods comparison and evaluation for iot, International Conference on Interoperability in IoT, pp.127-138, 2016. ,
Security and privacy considerations for iot application on smart grids : Survey and research challenges, IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp.63-68, 2016. ,
Home automation and security for mobile devices, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp.141-146, 2011. ,
Fog computing : Helping the internet of things realize its potential, Computer, vol.49, issue.8, pp.112-116, 2016. ,
Performance evaluation of an artificial neural network References multilayer perceptron with limited weights for detecting denial of service attack on internet of things. training, vol.11, p.12 ,
A survey of mobile cloud computing : architecture, applications, and approaches, Wireless communications and mobile computing, vol.13, issue.18, pp.1587-1611, 2013. ,
A key predistribution scheme for sensor networks using deployment knowledge, IEEE Transactions on dependable and secure computing, vol.3, issue.1, pp.62-77, 2006. ,
A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security, pp.41-47, 2002. ,
Efficient data tagging for managing privacy in the internet of things, 2012 IEEE International Conference on Green Computing and Communications (GreenCom), pp.244-248, 2012. ,
Sdn based architecture for iot and improvement of the security, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp.688-693, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02514869
Iot transaction security, 5th International Conference on the Internet of Things (IoT), 2015. ,
Internet of vehicles : From intelligent grid to autonomous cars and vehicular clouds, 2014 IEEE World Forum on Internet of Things (WF-IoT), pp.241-246, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01215589
Remote control and monitoring of smart home facilities via smartphone with wi-fly, IARIA, 2015. ,
Sdnbased security framework for the iot in distributed grid, International Multidisciplinary Conference on Computer and Energy Science (SpliTech), pp.1-5, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02430327
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security, pp.89-98, 2006. ,
Security for the internet of things : a survey of existing protocols and open research issues, IEEE Communications Surveys & Tutorials, vol.17, issue.3, pp.1294-1312, 2015. ,
Cp-abe with constant-size keys for lightweight devices, IEEE transactions on information forensics and security, vol.9, issue.5, pp.763-771, 2014. ,
A mobile cloud hierarchical trust management protocol for iot systems, 5th IEEE Int. Conf. on Mobile Cloud Computing, Services, and Engineering, pp.125-130, 2017. ,
A survey of trust computation models for service management in internet of things systems, Computer Communications, vol.97, pp.1-14, 2017. ,
A trust-based privacy-preserving friend recommendation scheme for online social networks, IEEE Trans. on Dependable and Secure Computing, vol.12, issue.4, pp.413-427, 2015. ,
A capability-based security approach to manage access control in the internet of things, Mathematical and Computer Modelling, vol.58, issue.5, pp.1189-1205, 2013. ,
Cloud-based commissioning of constrained devices using permissioned blockchains, Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, pp.29-36, 2016. ,
World of empowered iot users, IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), pp.13-24, 2016. ,
Distributed access control with privacy support in wireless sensor networks, IEEE Transactions on Wireless Communications, vol.10, issue.10, pp.3472-3481, 2011. ,
A system architecture for software-defined industrial internet of things, 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), pp.1-5, 2015. ,
Survey on fog computing : architecture, key technologies, applications and open issues, Journal of network and computer applications, vol.98, pp.27-42, 2017. ,
User interactive internet of things privacy preserved access control, 2012 International Conference for Internet Technology And Secured Transactions, pp.597-602, 2012. ,
6lowpan fragmentation attacks and mitigation mechanisms, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp.55-66, 2013. ,
Parallel clustering-based k-anonymity algorithm in internet of things, Information Technology, vol.12, p.3, 2013. ,
Octopus : An edge-fog mutual authentication scheme, IJ Network Security, vol.18, issue.6, pp.1089-1101, 2016. ,
Masfog : An efficient mutual authentication scheme for fog computing architecture, 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering, pp.608-613, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01881628
Rpr : A trust computation model for social internet of things, Int. IEEE Conf. on Smart World Congress, pp.930-937, 2016. ,
, IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.600-607, 2013.
Towards an ontology-driven blockchain design for supply chain provenance, 2016. ,
A signcryption scheme from certificateless to identity-based environment for wsns into iot, International Journal of Computer Applications, vol.120, issue.9, 2015. ,
Managing identities using blockchains and cosi, 9th Workshop on Hot Topics in Privacy Enhancing Technologies, 2016. ,
Distributed fine-grained secure control of smart actuators in internet of things, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp.653-660, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01742408
An efficient architecture for trust management in ioe based systems of systems, 13th Annual Conference on System of Systems Engineering (SoSE), pp.138-143, 2018. ,
Internet of things security : A top-down survey, Computer Networks, vol.141, pp.199-221, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01780365
Decentralized trust management based blockchain protocol for internet of things, IEEE Transactions on dependable and secure Computing ,
Assessing the impact of dos attacks on iot gateway, 2016. ,
Novel design of intelligent internet-of-vehicles management system based on cloud-computing and internet-of-things, Proceedings of 2011 International Conference on Electronic Mechanical References Engineering and Information Technology, vol.6, pp.3190-3193, 2011. ,
Practical access control for sensor networks in the context of the internet of things, Computer Communications, vol.89, pp.154-164, 2016. ,
, Clarifying trust in social internet of things, 2017.
Cyber security and privacy issues in smart grids, IEEE Communications Surveys & Tutorials, vol.14, issue.4, pp.981-997, 2012. ,
, Namecoin. namecoin. info, 2014.
A simple user authentication scheme for grid computing, IJ Network Security, vol.7, issue.2, pp.202-206, 2008. ,
A privacy-preserving trust model based on blockchain for vanets, IEEE Access, vol.6, pp.45655-45664, 2018. ,
Distributed access control with adaptive privacy preserving property for wireless sensor networks, vol.7, pp.759-773, 2014. ,
Using the cumulative sum algorithm against distributed denial of service attacks in internet of things, International Conference on Context-Aware Systems and Applications, pp.62-72, 2015. ,
Chain of a lifetime : How blockchain technology might transform personal insurance. Long Finance, 2014. ,
Dos attacks analysis and improvement in dtls protocol for internet of things, ACM International conference on Big Data and Advanced Wireless technologies (BDAW'2016), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423691
On perspective of security and privacy-preserving solutions in the internet of things, Computer Networks, vol.102, pp.83-95, 2016. ,
An enhanced remote user authentication scheme with smart card, International Journal of Network Security, vol.10, 2010. ,
Secured communication between mobile devices and smart home appliances, 2013 International Conference on Advanced Computer Science Applications and Technologies, pp.429-434, 2013. ,
Fully secure fuzzy identity-based encryption for secure iot communications, Computer Standards & Interfaces, vol.44, pp.117-121, 2016. ,
Getrust : A guarantee-based trust model in chordbased p2p networks, IEEE Trans. on Dependable and Secure Computing, vol.15, issue.1, pp.54-68, 2018. ,
Distributed attribute-based encryption, International Conference on Information Security and Cryptology-ICISC 2008, vol.5461, pp.20-36, 2009. ,
Bitcoin : A peer-to-peer electronic cash system, 2008. ,
Cisco global cloud index : Forecast and methodology, pp.2016-2021, 2016. ,
Survey on secure communication protocols for the internet of things, Ad Hoc Networks, vol.32, pp.17-31, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01272046
Trustworthiness management in the social internet of things, IEEE Trans. on Knowledge and Data Engineering, vol.26, issue.5, pp.1253-1266, 2014. ,
Achieving k-anonymity in privacy-aware location-based services, INFOCOM, pp.754-762, 2014. ,
Adaptation of Cryptographic Algorithms According to the Applications Requirements and Limitations : Design, Analyze and Lessons Learned. HDR dissertation, 2016. ,
Sdn based architecture for clustered wsn, 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp.342-347, 2015. ,
In search of an understandable consensus algorithm, {USENIX} Annual Technical Conference ({USENIX}{ATC} 14), pp.305-319, 2014. ,
Lightweight attribute-based encryption for the internet of things, 25th International Conference on Computer Communication and Networks (ICCCN), pp.1-6, 2016. ,
URL : https://hal.archives-ouvertes.fr/cea-01841672
Vanet-based approach for parking space availability, Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks, pp.75-76, 2007. ,
Communication method and device for remote control of an actuator for mobile equipment in a building, US Patent, vol.9, p.261, 2016. ,
Denial-of-service attacks on 6lowpan-rpl networks : Threats and an intrusion detection system proposition, Journal of Advanced Computer Science & Technology, vol.3, issue.2, p.143, 2014. ,
Application of blockchain technology in online voting, 2017. ,
Security and privacy challenges in industrial internet of things, 52nd ACM/EDAC/IEEE on Design Automation Conference (DAC), p.1, 2015. ,
, References, vol.127, 2015.
Fuzzy identity-based encryption, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.457-473, 2005. ,
Efficient hip-based approach to ensure lightweight end-to-end security in the internet of things, Computer Networks, vol.91, pp.26-45, 2015. ,
Trust management system design for the internet of things : A context-aware and multi-service approach, Computers & Security, vol.39, pp.351-365, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01281972
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
Intrusion detection in the rpl-connected 6lowpan networks, Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp.31-38, 2017. ,
A policy enforcement framework for internet of things applications in the smart health, 2017. ,
Security policy enforcement for networked smart objects, Computer Networks, vol.108, pp.133-147, 2016. ,
Internet of things : Security in the keys, Q2SWinet MSWiM, pp.129-133, 2016. ,
A decentralized approach for security and privacy challenges in the internet of things, 2014 IEEE World Forum on Internet of Things (WF-IoT), pp.67-72, 2014. ,
The fog computing paradigm : Scenarios and security issues, Federated Conference on Computer Science and Information Systems, pp.1-8, 2014. ,
The fog computing paradigm : Scenarios and security issues, Federated Conference on Computer Science and Information Systems, pp.1-8, 2014. ,
epass : An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things, Future Generation Computer Systems, vol.33, pp.11-18, 2014. ,
Servicetrust : Trust management in service provision networks, IEEE Int. Conf. on Services Computing, pp.272-279, 2013. ,
k-anonymity : A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
Avispa v1. 1 user manual. Information Society Technologies Programme, 2006. ,
Applying attribute-based encryption on publish subscribe messaging patterns for the internet of things, 2015 IEEE International Conference on Data Science and Data Intensive Systems (DSDIS), pp.556-563, 2015. ,
Secure data obfuscation scheme to enable privacy-preserving state estimation in smart grid ami networks, IEEE Internet of Things Journal, vol.3, issue.5, pp.709-719, 2016. ,
C-cp-abe : Cooperative ciphertext policy attribute-based encryption for the internet of things, 2014 International Conference on Advanced Networking Distributed Systems and Applications (INDS), pp.64-69, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01060169
Security improvement in iot based on software defined networking (sdn), International Journal of Engineering and Technology Research (IJSETR), vol.5, issue.1, pp.291-295, 2016. ,
Demystifying fog computing : Characterizing architectures, applications and abstractions, 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), pp.115-124, 2017. ,
A survey on mobile edge networks : Convergence of computing, caching and communications, IEEE Access, vol.5, pp.6757-6779, 2017. ,
Secure and efficient control transfer for iot devices, International Journal of Distributed Sensor Networks, vol.9, issue.11, p.503404, 2013. ,
Storj a peerto-peer cloud storage network, 2014. ,
Blockchain-based decentralized trust management in vehicular networks, IEEE Internet of Things Journal, 2018. ,
A lightweight attribute-based encryption scheme for the internet of things, Future Generation Computer Systems, vol.49, pp.104-112, 2015. ,
Fdac : Toward fine-grained distributed data access control in wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, vol.22, issue.4, pp.673-686, 2011. ,
Healthcare data gateways : found healthcare intelligence on blockchain with novel privacy risk control, Journal of medical systems, vol.40, issue.10, p.218, 2016. ,
Internet of things for smart cities, IEEE Internet of Things Journal, vol.1, issue.1, pp.22-32, 2014. ,
Fog computing in multi-tier data center networks : A hierarchical game approach, 2016 IEEE international conference on communications (ICC), pp.1-6, 2016. ,
Distributed privacy-preserving access control in sensor networks, IEEE Transactions on Parallel and Distributed Systems, vol.23, issue.8, pp.1427-1438, 2012. ,
Leap+ : Efficient security mechanisms for large-scale distributed sensor networks, ACM Trans. Sen. Netw, vol.2, issue.4, pp.500-528, 2006. ,
Remote control of industry robots using mobile devices, New Contributions in Information Systems and Technologies, pp.323-332, 2015. ,