Schottky‐contacted nanowire sensors

J Meng, Z Li - Advanced Materials, 2020 - Wiley Online Library
The progress of the Internet‐of‐Things in the past few years has necessitated the support of
high‐performance sensors. Schottky‐contacted nanowire sensors have attracted …

A survey on zero-knowledge authentication for internet of things

Z Chen, Y Jiang, X Song, L Chen - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is ubiquitous in our lives. However, the inherent vulnerability of
IoT smart devices can lead to the destruction of networks in untrustworthy environments …

SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles

G Xu, H Bai, J **ng, T Luo, NN **ong, X Cheng… - Journal of Parallel and …, 2022 - Elsevier
As an application of Internet of Things (IoT) technology, the Internet of Vehicles (IoV) faces
two main security issues:(1) the central server of the IoV may not be powerful enough to …

Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things

AD Dwivedi, R Singh, U Ghosh, RR Mukkamala… - Journal of Ambient …, 2022 - Springer
Nowadays, with the advancement of smart technologies, the Internet of Things (IoT)
emerged as a booming technology that can provide better quality and facilities for the …

Threats on the horizon: Understanding security threats in the era of cyber-physical systems

S Walker-Roberts, M Hammoudeh, O Aldabbas… - The Journal of …, 2020 - Springer
Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were
made possible by higher integration of physical and digital elements. In today's pervasive …

BP-AKAA: Blockchain-enforced privacy-preserving authentication and key agreement and access control for IIoT

S Liu, L Chen, H Yu, S Gao, H Fang - Journal of Information Security and …, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) links multiple subnets to accomplish more
real-time, efficient, and high-class production. Authentication is an essential prerequisite for …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for iot client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …

A service-oriented approach for sensing in the Internet of Things: Intelligent transportation systems and privacy use cases

M Hammoudeh, G Epiphaniou, S Belguith… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
This paper presents a Sensing-as-a-Service run-time Service Oriented Architecture (SOA),
called 3SOA, for the development of Internet of Things (IoT) applications. 3SOA aims to …

[HTML][HTML] A privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs

D Soler, C Dafonte, M Fernández-Veiga, AF Vilas… - Computer Networks, 2024 - Elsevier
High-entropy random numbers are an essential part of cryptography, and Quantum Random
Number Generators (QRNG) are an emergent technology that can provide high-quality keys …

[HTML][HTML] Emerging authentication technologies for zero trust on the internet of things

C Bast, KH Yeh - Symmetry, 2024 - mdpi.com
The large and interconnected nature of the Internet of Things (IoT) presents unique security
challenges, even as it revolutionizes various sectors. With numerous devices, often limited in …