LEAF-IIoT: Lightweight and efficient authentication framework for the industrial internet of things
The Internet of Things (IoT) has emerged as a revolutionary communication technology,
enabling the connection of resource-limited devices to the Internet. These devices are …
enabling the connection of resource-limited devices to the Internet. These devices are …
Dual UAV cluster-assisted maritime physical layer secure communications via collaborative beamforming
Unmanned aerial vehicles (UAVs) can be utilized as relay platforms to assist maritime
wireless communications. However, complex channels and multipath effects at sea can …
wireless communications. However, complex channels and multipath effects at sea can …
ER-CGKA: Efficient and robust continuous group key agreement scheme with post-compromise forward security for IoV
G Xu, X Yin, X Li - PloS one, 2024 - journals.plos.org
The Internet of Vehicles (IoV) counts for much in advancing intelligent transportation by
connecting people, vehicles, infrastructures, and cloud servers (CS). However, the open …
connecting people, vehicles, infrastructures, and cloud servers (CS). However, the open …
Develo** a Provable Secure and Cloud-Centric Authentication Protocol for the e-Healthcare System
A Alzahrani - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing provides best-in-class facilities to the healthcare system, a resource-
limited environment with low mobility, delay in transmission and non-intelligent disease …
limited environment with low mobility, delay in transmission and non-intelligent disease …
Designing Secure Location-Based Authenticated Key Agreement Mechanism in Maritime Internet of Vessels for Big Data Analytics
Maritime communication, critical for global oceanic trade, faces challenges and
opportunities with advancements in Information and Communication Technology (ICT) …
opportunities with advancements in Information and Communication Technology (ICT) …
面向算力网络的智慧调度综述
**逸博, **小**, 王爽, 蒋嶷川 - 自动化学报, 2024 - aas.net.cn
分布异构计算资源通过网络连接形成算力网络(Computing power network, CPN), 其以“连”
和“算” 为核心. 针对广分布异构性导致可行解空间巨大, **不确定性导致可行解空间易变 …
和“算” 为核心. 针对广分布异构性导致可行解空间巨大, **不确定性导致可行解空间易变 …
Big Data-Enabled Authentication Framework for Offshore Maritime Communication Using Drones
The maritime transportation industry is a prime target for cybersecurity attacks due to the
inherent risks of transmitting sensitive information required for its smooth operation. The …
inherent risks of transmitting sensitive information required for its smooth operation. The …
A machine learning approach towards reviewing the role of 'Internet of Things' in the ship** industry
K Gerakoudi, G Kokosalakis, PJ Stavroulakis - Journal of Ship** and …, 2024 - Springer
The technology of the Internet of Things (IoT) represents a cornerstone of the fourth
industrial revolution. We adopt a machine learning approach to examine the effect of IoT …
industrial revolution. We adopt a machine learning approach to examine the effect of IoT …
AEAKA: An Adaptive and Efficient Authentication and Key Agreement Scheme for IoT in Cloud-Edge-Device Collaborative Environments
K Liu, J Guan, X Hu, J Zhang, J Liu, H Zhang - arxiv preprint arxiv …, 2024 - arxiv.org
To meet the diverse needs of users, the rapid advancement of cloud-edge-device
collaboration has become a standard practice. However, this complex environment …
collaboration has become a standard practice. However, this complex environment …
IDIA: IOTA and Decentralized Identifiers Assisted Authentication in Smart Oceans
Centralized identity management systems face significant challenges, including
vulnerabilities to single points of failure, scalability issues, and privacy and control concerns …
vulnerabilities to single points of failure, scalability issues, and privacy and control concerns …