Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …
and communication advancements will empower better administration of accessible …
A Bibliometrics Analysis of Medical Internet of Things for Modern Healthcare
The integration of the Internet of Things (IoT) in healthcare has been a popular topic in
recent years. This article provides a comprehensive review of the medical IoT for healthcare …
recent years. This article provides a comprehensive review of the medical IoT for healthcare …
[HTML][HTML] Network security challenges and countermeasures for software-defined smart grids: A survey
The rise of grid modernization has been prompted by the escalating demand for power, the
deteriorating state of infrastructure, and the growing concern regarding the reliability of …
deteriorating state of infrastructure, and the growing concern regarding the reliability of …
[PDF][PDF] Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of
applications and greatly attractive benefits, for example, self-governing, low expenditure on …
applications and greatly attractive benefits, for example, self-governing, low expenditure on …
[HTML][HTML] Privacy-preserving authentication scheme based on zero trust architecture
Zero trust architecture is an end-to-end approach for server resources and data security
which contains identity authentication, access control, dynamic evaluation, and so on. This …
which contains identity authentication, access control, dynamic evaluation, and so on. This …
Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing
With the continuing growth in various research domains such as Artificial Intelligence (AI),
Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet …
Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet …
[HTML][HTML] ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor
Smart grid (SG) has been received significant attention due to various services such as
renewable energy and demand response. However, SG is fragile to various security attacks …
renewable energy and demand response. However, SG is fragile to various security attacks …
Physically secure and conditional-privacy authenticated key agreement for VANETs
To avoid physically extracting secrets from the storage of devices, Physical Unclonable
Function (PUF) is used in various authentication schemes. In these schemes, after the …
Function (PUF) is used in various authentication schemes. In these schemes, after the …
A security enhanced chaotic-map based authentication protocol for internet of drones
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling
them to participate in a connected network. In IoD infrastructure, drones communicate not …
them to participate in a connected network. In IoD infrastructure, drones communicate not …
A secure and privacy-preserving lightweight authentication and key exchange algorithm for smart agriculture monitoring system
Agriculture plays a vital role in the economic life cycle of an agrarian country and considers
the backbone of the economy. It supplies not just raw food materials, but also a vast number …
the backbone of the economy. It supplies not just raw food materials, but also a vast number …