1. Dudhe P.V., Kadam N.V., Hushangabade R.M., andDeshmukh, M.S, August. Internet of Things (IOT): An overview and its applications. In2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), IEEE, pp.2650-2653, 2017.
2. Dorsemaine B., Gaulier J.P., Wary J.P., Kheir N., andUrien, P. Internet of things: a definition & taxonomy. In2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, IEEE, pp.72-77, 2015.
3. Kakkar L., Gupta D., Saxena S., andTanwar S.An analysis of integration of internet of things and cloud computing. Journal of Computational and Theoretical Nanoscience, 16(10), pp.4345-4349, 2019.
4. Kakkar L., Gupta D., Saxena S., andTanwar S.IoT Architectures and Its Security: A Review. In Proceedings of the Second International Conference on Information Management and Machine Intelligence, Springer, Singapore., pp.87-94, 2021.
5. Kumari S., Karuppiah M., Das A.K., Li X., Wu F., andKumar N. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing, 74(12), pp.6428-6453., 2018.
6. Zhou J., Leppanen T., Harjula E., Ylianttila M., Ojala T., Yu C., Jin H., andYang, L.T. Cloudthings: A common architecture for integrating the internet of things with cloud computing. In Proceedings of the2013 IEEE 17th international conference on computer supported cooperative work in design (CSCWD), IEEE, pp.651-657, 2013.
7. Chang K.D., Chen C.Y., Chen J.L., andChao H.C.Internet of things and cloud computing for future internet. In International conference on security-enriched urban computing and smart grid. Springer, Berlin, Heidelberg, pp.1-10, 2011.
8. Botta A.,De Donato, W., Persico, V., and Pescapé, A. Integration of cloud computing and internet of things: a survey. Future generation computer systems, 56, pp.684-700, 2016.
9. Pilloni V., Atzori L., andMallus M.Dynamic involvement of real world objects in the IoT: A consensus-based cooperation approach. Sensors, 17(3), pp.484, 2017.
10. Boyes H., Hallaq B., Cunningham J., andWatson T.The industrial internet of things (IIoT): An analysis framework. Computers in industry, 101, pp.1-12, 2018.
11. Yang Y., Lu J., Choo K.K.R., and Liu, J.K. On lightweight security enforcement in cyber-physical systems. In Lightweight Cryptography for Security and Privacy, Springer, Cham, pp.97-112, 2015.
12. D’Orazio, C.J. and Choo, K.K.R. Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. Future Generation Computer Systems, 79, pp.247-261, 2018.
13. D’Orazio, C.J., Choo, K.K.R., and Yang, L.T. Data exfiltration from Internet of Things devices: iOS devices as case studies. IEEE Internet of Things Journal, 4(2), pp.524-535, 2016.
14. Zheng Y.Digital signcryption or how to achieve cost (signature & encryption)« cost (signature)+ cost (encryption). In Annual international cryptology conference, Springer, Berlin, Heidelberg, pp.165-179, 1997.
15. Zhang A., Wang L., Ye X., andLin X.Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Transactions on Information Forensics and Security, 12(3), pp.662-675, 2016.
16. Zhou C., Zhao Z., Zhou W., andMei Y.Certificateless key-insulated generalized signcryption scheme without bilinear pairings. Security and Communication Networks, 2017.
17. Zhang B., Jia Z., andZhao C.An efficient certificateless generalized signcryption scheme. Security and Communication Networks, 2018.
18. Zhou C.An improved lightweight certificateless generalized signcryption scheme for mobile-health system. International Journal of Distributed Sensor Networks, 15(1), pp.1-16, 2019.
19. Braeken A.Pairing free certificate based signcryption schemes using ECQV implicit certificates. KSII Transactions on Internet and Information Systems (TIIS), 13(3), pp.1546-1565, 2019.
20. Karati A., Fan C.I., andHsu R.H.Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices. IEEE Internet of Things Journal, 6(6), pp.10431-10440, 2019.
21. Gutmann P.PKI: it's not dead, just resting. Computer, 35(8), pp.41-49, 2002.
22. Shamir, A. August.Identity-based cryptosystems and signature schemes. In Workshop on the theory and application of cryptographic techniques, Springer, Berlin, Heidelberg, pp.47-53, 1984.
23. Al-Riyami, S.S. and Paterson, K.G. Certificateless public key cryptography. In International conference on the theory and application of cryptology and information security, Springer, Berlin, Heidelberg, pp.452-473, 2003.
24. Wu, C. and Chen, Z. A new efficient certificateless signcryption scheme. In2008 International Symposium on Information Science and Engineering, IEEE, 1, pp.661-664, 2008.
25. Gura N., Patel A., Wander A., Eberle H., andShantz S.C.Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In International workshop on cryptographic hardware and embedded systems, Springer, Berlin, Heidelberg, pp.119-132, 2004.
26. Bos J., Kaihara M., Kleinjung T., Lenstra A.K., andMontgomery P.L.On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography, infoscience.epfl, 2009.
27. Kute V.B., Paradhi P.R., andBamnote G.R.A software comparison of rsa and ecc. Int. J. Comput. Sci. Appl, 2(1), pp.43-59, 2009.
28. Jansma, N. and Arrendondo, B.Performance comparison of elliptic curve and rsa digital signatures. nicj. net/files, 2004.
29. Alese B.K., Philemon E.D., andFalaki S.O.Comparative analysis of public-key encryption schemes. International Journal of Engineering and Technology, 2(9), pp.1552-1568, 2012.
30. Mahto D., Khan D.A., andYadav D.K.Security analysis of elliptic curve cryptography and RSA. In Proceedings of the world congress on engineering, 1, pp.419-422, 2016.
31. Ullah I., Amin N.U., Khan M.A., Khattak H., andKumari S.An efficient and provable secure certificate-based combined signature, encryption and signcryption scheme for internet of things (IoT) in mobile health (M-health) system. Journal of Medical Systems, 45(1), pp.1-14, 2021. |