[HTML][HTML] Lightweight authentication protocol for connected medical IoT through privacy-preserving access

M Tanveer, SA Chelloug, M Alabdulhafith… - Egyptian Informatics …, 2024 - Elsevier
With the rapid progress of communication technology, the Internet of Things (IoT) has
emerged as an essential element in our daily lives. Given that the IoT encompasses diverse …

Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism

O Alruwaili, M Tanveer, FM Alotaibi, W Abdelfattah… - Heliyon, 2024 - cell.com
Abstract As the Internet of Things (IoT) continues its rapid expansion, cloud computing has
become integral to various smart healthcare applications. However, the proliferation of …

[HTML][HTML] RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks

M Tanveer, SA Aldossari - Alexandria Engineering Journal, 2025 - Elsevier
The rapid expansion of Mobile Edge Computing (MEC) and the Internet of Things (IoT) has
revolutionized technology by enabling real-time data processing at the network edge, which …

RAP-MEC: Robust authentication protocol for the mobile edge computing services

FM Alotaibi, LA Maghrabi, M Tanveer, M Ahmad… - IEEE …, 2024 - ieeexplore.ieee.org
The emergence of edge computing has revolutionized the landscape of modern
applications, offering remarkable advantages such as low-latency and high-bandwidth …

PSAF-IoT: Physically secure authentication framework for the Internet of Things

O Alruwaili, FM Alotaibi, M Tanveer, S Chaoui… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) revolutionizes connectivity, as IoT devices grow exponentially,
vulnerabilities emerge, ranging from data breaches to device hijacking. Thus there is the …

Secure and efficient biometric-based anonymous authentication scheme for mobile-edge computing

Q Zhu, L You, G Hu, S Wang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Currently, the biometric-based authentication schemes have been widely deployed in the
mobile edge computing environment to ensure the authenticity of the edge nodes' identities …

RLBA-UAV: A Robust and Lightweight Blockchain-Based Authentication and Key Agreement Scheme for PUF-Enabled UAVs

S Yu, AK Das, Y Park - IEEE Transactions on Intelligent …, 2024 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) integrated with the internet of things (IoT) guarantee
useful advantages such as facilitating ground communications in regions where the …

REHAS: Robust and Efficient Hyperelliptic Curve‐Based Authentication Scheme for Internet of Drones

B Pratap, A Singh, PS Mehra - Concurrency and Computation …, 2025 - Wiley Online Library
ABSTRACT Internet of Drones (IoD) is one of the most beneficial and has many versatile
applications like Surveillance and Security, Delivery and Logistics, Environmental …

[HTML][HTML] A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones

J Choi, S Son, D Kwon, Y Park - Sensors, 2025 - mdpi.com
The Internet of Drones (IoD) is an emerging industry that offers convenient services for
humans due to the high mobility and flexibility of drones. The IoD substantially enhances …

[HTML][HTML] Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications

MA Sen, S Al-Rubaye, A Tsourdos - Sensors, 2025 - mdpi.com
Unmanned Aerial Vehicles (UAVs) have revolutionized numerous domains by introducing
exceptional capabilities and efficiencies. As UAVs become increasingly integrated into …