IoMT malware detection approaches: analysis and research challenges

M Wazid, AK Das, JJPC Rodrigues, S Shetty… - IEEE …, 2019 - ieeexplore.ieee.org
The advancement in Information and Communications Technology (ICT) has changed the
entire paradigm of computing. Because of such advancement, we have new types of …

Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges

S Pundir, M Wazid, DP Singh, AK Das… - IEEE …, 2019 - ieeexplore.ieee.org
As we all know that the technology is projected to be next to humans very soon because of
its holistic growth. Now-a-days, we see a lot of applications that are making our lives …

BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment

N Garg, M Wazid, AK Das, DP Singh… - IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) is a kind of connected infrastructure of smart medical
devices along with software applications, health systems and services. These medical …

Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment

M Wazid, AK Das, N Kumar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …

An efficient decentralized key management mechanism for VANET with blockchain

Z Ma, J Zhang, Y Guo, Y Liu, X Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The vehicular ad hoc network (VANET) has been considered as one of the most prominent
technologies for improving the efficiency and safety of modern transportation systems …

Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment

AK Das, M Wazid, N Kumar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Due to the widespread popularity of Internet-enabled devices, Industrial Internet of Things
(IIoT) becomes popular in recent years. However, as the smart devices share the information …

Design of secure key management and user authentication scheme for fog computing services

M Wazid, AK Das, N Kumar, AV Vasilakos - Future Generation Computer …, 2019 - Elsevier
Fog computing (fog networking) is known as a decentralized computing infrastructure in
which data, applications, compute as well as data storage are scattered in the most logical …

[BOEK][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[BOEK][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Provably secure ECC-based device access control and key agreement protocol for IoT environment

AK Das, M Wazid, AR Yannam, JJPC Rodrigues… - IEEE …, 2019 - ieeexplore.ieee.org
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …