Bella G, Paulson L (1998) Kerberos version IV: inductive analysis of the secrecy goals. In: Computer security – ESORICS 98, Louvain-la-Neuve, pp 361–375
Google Scholar
Chen P, Wang X, Wu Y, Su J, Zhou H (2015) POSTER: iPKI: identity-based private key infrastructure for securing BGP protocol. In: 22nd ACM SIGSAC conference on computer and communications security, Colorado, pp 1632–1634
Google Scholar
El-Sayed H, Sankar S, Prasad M, Puthal D, Gupta A, Mohanty M, Lin C (2017) Edge of things: the big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 6:1706–1717
CrossRef
Google Scholar
Fox G, Gadgil H, Pallickara S, Pierce M, Grossman R, Gu Y, Hanley D, Hong X (2004) High performance data streaming in service architecture. Technical report, Indiana University and University of Illinois at Chicago
Google Scholar
Granjal J, Monteiro E, Sá Silva J (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutorials 17(3):1294–1312
CrossRef
Google Scholar
Medaglia C, Serbanati A (2010) An overview of privacy and security issues in the internet of things. In: The internet of things. Springer, New York, pp 389–395
CrossRef
Google Scholar
Nehme R, Lim H, Bertino E, Rundensteiner E (2009) StreamShield: a stream-centric approach towards security and privacy in data stream environments. In: ACM SIGMOD international conference on management of data, Rhode Island, pp 1027–1030
Google Scholar
Puthal D, Nepal S, Ranjan R, Chen J (2015a) DPBSV- An efficient and secure scheme for big sensing data stream. In: 14th IEEE international conference on trust, security and privacy in computing and communications, Helsinki, pp 246–253
Google Scholar
Puthal D, Nepal S, Ranjan R, Chen J (2015b) A dynamic key length based approach for real-time security verification of big sensing data stream. In: 16th international conference on web information system engineering, Miami, pp 93–108
Google Scholar
Puthal D, Nepal S, Ranjan R, Chen J (2016a) Threats to networking cloud and edge datacenters in the Internet of Things. IEEE Cloud Computing 3(3):64–71
CrossRef
Google Scholar
Puthal D, Nepal S, Ranjan R, Chen J (2016b) DLSeF: A dynamic key length based efficient real-time security verification model for big data stream. ACM Trans Embed Comput Syst 16(2):51
CrossRef
Google Scholar
Puthal D, Mohanty S, Nanda P, Choppali U (2017a) Building security perimeters to protect network systems against cyber threats. IEEE Consum Electron Mag 6(4):24–27
CrossRef
Google Scholar
Puthal D, Ranjan R, Nepal S, Chen J (2017b) IoT and Big Data: an architecture with data flow and security issues. In: Cloud infrastructures, services, and IoT systems for smart cities, Brindisi, pp 243–252
Google Scholar
Puthal D, Nepal S, Ranjan R, Chen J (2017c) A dynamic prime number based efficient security mechanism for big sensing data streams. J Comput Syst Sci 83(1):22–42
MathSciNet
MATH
CrossRef
Google Scholar
Puthal D, Wu X, Nepal S, Ranjan R, Chen J (2017d, in press) SEEN: a selective encryption method to ensure confidentiality for big sensing data streams. IEEE Trans Big Data
Google Scholar
Puthal D, Obaidat M, Nanda, P, Prasad M, Mohanty S, Zomaya A (2017e, in press) Secure and sustainable load balancing of edge datacenters in fog computing. IEEE Communs Mag
Google Scholar
Sharma S, Puthal D, Tazeen S, Prasad M, Zomaya AY (2017) MSGR: a mode-switched grid-based sustainable routing protocol for wireless sensor networks. IEEE Access 5:19864–19875
CrossRef
Google Scholar
Weber R (2010) Internet of things–new security and privacy challenges. Comput Law Secur Rev 26(1):23–30
CrossRef
Google Scholar