Key agreement and authentication protocols in the Internet of Things: A survey
S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …
[PDF][PDF] Securing smart agriculture: Cybersecurity challenges and solutions in IoT-driven farms
Smart agriculture, driven by the Internet of Things (IoT), has revolutionized modern farming,
leading to enhanced efficiency, resource optimization, and improved crop yields. However …
leading to enhanced efficiency, resource optimization, and improved crop yields. However …
[HTML][HTML] Smart Contracts and Shared Platforms in Sustainable Health Care: Systematic Review
CA Marino, C Diaz Paz - JMIR Medical Informatics, 2025 - medinform.jmir.org
Background The benefits of smart contracts (SCs) for sustainable health care are a relatively
recent topic that has gathered attention given its relationship with trust and the advantages …
recent topic that has gathered attention given its relationship with trust and the advantages …
[HTML][HTML] AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications
Abstract Controller-Pilot Data Link Communications (CPDLC) are rapidly replacing voice-
based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly …
based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly …
LightAuth: a lightweight sensor nodes authentication framework for smart health system
Counterfeit medical devices pose a threat to patient safety, necessitating a secure device
authentication system for medical applications. Resource‐constrained sensory nodes are …
authentication system for medical applications. Resource‐constrained sensory nodes are …
PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks
MR Patruni, AG Humayun - International Journal of Information Security, 2024 - Springer
In 5G, the next generation of technologies like the Internet of Medical Things (IoMT)
cooperate with networking artifacts to provide seamless connectivity. To provide effective …
cooperate with networking artifacts to provide seamless connectivity. To provide effective …
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0
Industry 4.0 and the industrial Internet of Things (IIoT) aim to create a platform for data-driven
decision-making through machine-to-machine (M2M) communication, often facilitated by the …
decision-making through machine-to-machine (M2M) communication, often facilitated by the …
A Blockchain-assisted lightweight privacy preserving authentication protocol for peer-to-peer communication in vehicular ad-hoc network
SJ Payattukalanirappel, PV Vamattathil… - Peer-to-Peer Networking …, 2024 - Springer
Abstract Vehicular Ad-Hoc Network (VANET), provides considerable real-time traffic
information services that enhance safety and traffic effectiveness. However, as most of the …
information services that enhance safety and traffic effectiveness. However, as most of the …
[HTML][HTML] Towards a federated and hybrid cloud computing environment for sustainable and effective provisioning of cyber security virtual laboratories
Cloud Computing (CC) and virtualization concepts are two advanced technologies
introduced to empower distance and blended learning. Besides, they play a crucial role in …
introduced to empower distance and blended learning. Besides, they play a crucial role in …
Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm
R Agrawal, S Singhal, A Sharma - Cluster Computing, 2024 - Springer
Blockchain technology ensures the integrity and transparency of data access control by
kee** an unchangeable record of all transactions. Fog computing increases efficiency by …
kee** an unchangeable record of all transactions. Fog computing increases efficiency by …