[HTML][HTML] A survey on the adoption of blockchain in iot: Challenges and solutions

MA Uddin, A Stranieri, I Gondal… - Blockchain: Research …, 2021 - Elsevier
Abstract Conventional Internet of Things (IoT) ecosystems involve data streaming from
sensors, through Fog devices to a centralized Cloud server. Issues that arise include privacy …

PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare

M Masud, GS Gaba, K Choudhary… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …

[HTML][HTML] A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

[HTML][HTML] Security and privacy in IoT-cloud-based e-health systems—A comprehensive review

C Butpheng, KH Yeh, H **ong - Symmetry, 2020 - mdpi.com
When the Internet and other interconnected networks are used in a health system, it is
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …

RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones

M Tanveer, N Kumar, MM Hassan - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …

Provably secure ECC-based device access control and key agreement protocol for IoT environment

AK Das, M Wazid, AR Yannam, JJPC Rodrigues… - IEEE …, 2019 - ieeexplore.ieee.org
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …

Hybrid cryptographic approach to enhance the mode of key management system in cloud environment

S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …

[HTML][HTML] A lightweight three factor authentication framework for IoT based critical applications

M Saqib, B Jasra, AH Moon - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT is emerging as a massive web of heterogeneous networks estimated to interconnect
over 41 billion devices by 2025, generating around 79 zettabytes of data. The …