Secure remote user authenticated key establishment protocol for smart home environment

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …

Anonymous authentication scheme for smart home environment with provable security

M Shuai, N Yu, H Wang, L **ong - Computers & Security, 2019 - Elsevier
Smart home is an emerging paradigm of the Internet of Things (IoT), which facilitates an
individual to operate the smart home appliances remotely through the internet. Since the …

Lightweight and secure session-key establishment scheme in smart home environments

P Kumar, A Gurtov, J Iinatti, M Ylianttila… - IEEE Sensors …, 2015 - ieeexplore.ieee.org
The proliferation of current wireless communications and information technologies have
been altering humans lifestyle and social interactions-the next frontier is the smart home …

Anonymous secure framework in connected smart home environments

P Kumar, A Braeken, A Gurtov, J Iinatti… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The smart home is an environment, where heterogeneous electronic devices and
appliances are networked together to provide smart services in a ubiquitous manner to the …

Toward a secure smart-home IoT access control scheme based on home registration approach

TY Wu, Q Meng, YC Chen, S Kumari, CM Chen - Mathematics, 2023 - mdpi.com
The extensive application of the Internet of Things (IoT) and artificial intelligence technology
has greatly promoted the construction and development of smart cities. Smart home as the …

Cryptanalysis and improvement of a two-factor user authentication scheme for smart home

D Kaur, D Kumar - Journal of Information Security and Applications, 2021 - Elsevier
Smart home is a latest technology in the field of Internet of Things (IoT) through which one
can manage the smart devices at home using internet. This communication takes place via …

Envisioned speech recognition using EEG sensors

P Kumar, R Saini, PP Roy, PK Sahu… - Personal and Ubiquitous …, 2018 - Springer
Recent advances in EEG technology makes brain-computer-interface (BCI) an exciting field
of research. BCI is primarily used to adopt with the paralyzed human body parts. However …

An efficient, anonymous and robust authentication scheme for smart home environments

S Banerjee, V Odelu, AK Das, S Chattopadhyay, Y Park - Sensors, 2020 - mdpi.com
In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as
an important facet of IoT, has gained its focus for smart intelligent systems. As users …

Session-key establishment and authentication in a smart home network using public key cryptography

S Dey, A Hossain - IEEE Sensors Letters, 2019 - ieeexplore.ieee.org
The development of the applications of Internet of Things (IoT) technology continues to grow
steadily-one of the top applications being smart home environments. A smart home …

An efficient and secure scheme for smart home communication using identity-based signcryption

Y Ashibani, QH Mahmoud - 2017 IEEE 36th international …, 2017 - ieeexplore.ieee.org
Securing communication between users and devices is an important aspect of Internet of
Things applications. Although a number of cryptographic schemes have been proposed for …