|
[1] Breaking down mirai: An iot ddos botnet analysis. https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html. [2] D. Balenson, D. McGrew, and A. Sherman. Key management for large dynamic groups: One-way function trees and amortized initialization, 1999. [3] A. Banks and R. Gupta. Mqtt version 3.1. 1. OASIS standard, 2014. [4] I. Damgård, H. Haagh, and C. Orlandi. Access control encryption: Enforcing information flow with cryptography. In Theory of Cryptography Conference, pages 547–576. Springer, 2016. [5] H. Harney and E. Harder. Logical key hierarchy protocol. Technical report, Internet draft, 1999. [6] G. Horng. Cryptanalysis of a key management scheme for secure multicast communications. IEICE Transactions on Communications, 85(5):1050–1051, 2002. [7] Information technology – Telecommunications and information exchange between systems – Near Field Communication – Interface and Protocol (NFCIP-1). Standard, International Organization for Standardization, Mar. 2013. [8] S. Jahid, P. Mittal, and N. Borisov. Easier: Encryption-based access control in social networks with efficient revocation. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pages 411–415. ACM, 2011. [9] T. H.-J. Kim, L. Bauer, J. Newsome, A. Perrig, and J. Walker. Challenges in access right assignment for secure home networks. In HotSec, 2010. [10] M. Y. Malik. Efficient group key management schemes for multicast dynamic communication systems. arXiv preprint arXiv:1211.3502, 2012. [11] M.-H. Park, Y.-H. Park, H.-Y. Jeong, and S.-W. Seo. Key management for multiple multicast groups in wireless networks. IEEE Transactions on Mobile Computing, 12(9):1712–1723, 2013. [12] B. Purushothama and B. Amberker. Group key management scheme for simultaneous multiple groups with overlapped membership. In Communication Systems and Networks (COMSNETS), 2011 Third International Conference on, pages 1–10. IEEE, 2011. [13] S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, and G. Bianchi. Key management protocol with implicit certificates for iot systems. In Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, pages 37–42. ACM, 2015. [14] C. Soriente, G. Tsudik, and E. Uzun. Secure pairing of interface constrained devices. International Journal of Security and Networks, 4(1-2):17–26, 2009. [15] P. Vijayakumar, S. Bose, and A. Kannan. Chinese remainder theorem based centralised group key management for secure multicast communication. IET information Security, 8(3):179–187, 2014. [16] J. Zhang and V. Varadharajan. Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications, 33(2):63–75, 2010.
|