Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions

B Bhushan, C Sahoo, P Sinha, A Khamparia - Wireless Networks, 2021 - Springer
Abstract The Internet of Things (IoTs) enables coupling of digital and physical objects using
worthy communication technologies and introduces a future vision where computing …

A survey on security challenges and protocols of electric vehicle dynamic charging system

PR Babu, B Palaniswamy, AG Reddy… - Security and …, 2022 - Wiley Online Library
Electric vehicle (EV) has emerged as the future of transport worldwide, with the rising need
for greener and energy‐efficient transportation solutions. The adoption of EVs can …

[HTML][HTML] Terminal independent security token derivation scheme for ultra-dense IoT networks

VO Nyangaresi - Array, 2022 - Elsevier
Abstract The Fifth Generation (5G) networks deploy base station ultra-densification to boost
data rates, capacities, reliability, energy efficiency as well as the reduction of communication …

Lightweight authentication protocol for M2M communications of resource-constrained devices in industrial Internet of Things

E Lara, L Aguilar, MA Sanchez, JA García - Sensors, 2020 - mdpi.com
The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect
and control production systems. Its benefits include supply chain monitoring and machine …

[HTML][HTML] Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology

MF Ayub, K Mahmood, S Kumari… - Digital Communications …, 2021 - Elsevier
Modern information technology has been utilized progressively to store and distribute a
large amount of healthcare data to reduce costs and improve medical facilities. In this …

ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV

N **, W Li, L **g, J Ma - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is a typical application of mobile Internet of Things (IoT), which
aims to improve road conditions and enhance the driving experience. However, the issue of …

Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography

B Ying, A Nayak - Journal of network and computer applications, 2019 - Elsevier
Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous
mutual authentication protocol needs to be developed for complex 5G networks. In this …

E-AUA: An efficient anonymous user authentication protocol for mobile IoT

X Zeng, G Xu, X Zheng, Y **ang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The emergence of the mobile Internet of Things (IoT) has made our lives smarter, relying on
its various mobile IoT devices and services provided. However, with the explosively …

[Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server

N Khan, J Zhang, SU Jan - Security and Communication …, 2022 - Wiley Online Library
Everyone desires to avail online services provided by different service providers securely,
efficiently, and effectively. In this regard, security is still a significant concern for them …

Cybersecurity attack-resilience authentication mechanism for intelligent healthcare system

P Soni, J Pradhan, AK Pal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
People focus on the intelligent healthcare system expecting sufficient medical facilities even
from a remote location. However, to make the healthcare system more trustworthy, secure …