Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects

AR Javed, F Shahzad, S ur Rehman, YB Zikria… - Cities, 2022‏ - Elsevier
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …

A Bibliometrics Analysis of Medical Internet of Things for Modern Healthcare

HS Nguyen, HC Danh, QP Ma, J Mesicek, J Hajnys… - Electronics, 2023‏ - mdpi.com
The integration of the Internet of Things (IoT) in healthcare has been a popular topic in
recent years. This article provides a comprehensive review of the medical IoT for healthcare …

[HTML][HTML] Network security challenges and countermeasures for software-defined smart grids: A survey

D Agnew, S Boamah, A Bretas, J McNair - Smart cities, 2024‏ - mdpi.com
The rise of grid modernization has been prompted by the escalating demand for power, the
deteriorating state of infrastructure, and the growing concern regarding the reliability of …

[PDF][PDF] Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.

JR Arunkumar, S Velmurugan… - … Systems Science & …, 2023‏ - cdn.techscience.cn
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of
applications and greatly attractive benefits, for example, self-governing, low expenditure on …

[HTML][HTML] Privacy-preserving authentication scheme based on zero trust architecture

F Tang, C Ma, K Cheng - Digital Communications and Networks, 2024‏ - Elsevier
Zero trust architecture is an end-to-end approach for server resources and data security
which contains identity authentication, access control, dynamic evaluation, and so on. This …

Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing

M Shariq, M Conti, K Singh, C Lal, AK Das… - Computer Networks, 2024‏ - Elsevier
With the continuing growth in various research domains such as Artificial Intelligence (AI),
Machine Learning (ML), Big Data Analytics (BDA), and Cloud Computing (CC), the Internet …

[HTML][HTML] ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor

SJ Yu, KS Park - Journal of Systems Architecture, 2022‏ - Elsevier
Smart grid (SG) has been received significant attention due to various services such as
renewable energy and demand response. However, SG is fragile to various security attacks …

Physically secure and conditional-privacy authenticated key agreement for VANETs

Y Liang, E Luo, Y Liu - IEEE Transactions on Vehicular …, 2023‏ - ieeexplore.ieee.org
To avoid physically extracting secrets from the storage of devices, Physical Unclonable
Function (PUF) is used in various authentication schemes. In these schemes, after the …

A security enhanced chaotic-map based authentication protocol for internet of drones

K Mahmood, Z Ghaffar, M Farooq… - IEEE Internet of …, 2024‏ - ieeexplore.ieee.org
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling
them to participate in a connected network. In IoD infrastructure, drones communicate not …

A secure and privacy-preserving lightweight authentication and key exchange algorithm for smart agriculture monitoring system

S Itoo, AA Khan, M Ahmad, MJ Idrisi - IEEE Access, 2023‏ - ieeexplore.ieee.org
Agriculture plays a vital role in the economic life cycle of an agrarian country and considers
the backbone of the economy. It supplies not just raw food materials, but also a vast number …