A sustainable pattern of waste management and energy efficiency in smart homes using the internet of things (IoT)

M Ehsanifar, F Dekamini, C Spulbar, R Birau… - Sustainability, 2023 - mdpi.com
Nowadays, environmental protection involves many issues and problems, among which the
waste generated by various human activities makes up a significant share, which is …

LightIoT: Lightweight and secure communication for energy-efficient IoT in health informatics

MA Jan, F Khan, S Mastorakis, M Adil… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled
devices are used for in-hospital and in-home patient monitoring to collect and transfer …

Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things

Z Yang, J He, Y Tian, J Zhou - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet
connectivity beyond traditional computing devices like computers and smartphones to the …

A lightweight mutual and transitive authentication mechanism for IoT network

R Krishnasrija, AK Mandal, A Cortesi - Ad Hoc Networks, 2023 - Elsevier
IoT devices are typically authenticated directly by gateways present in the network.
However, in large and complex IoT systems like the smart city or smart industry which …

SafeCom: Robust mutual authentication and session key sharing protocol for underwater wireless sensor networks

CM Kumar, R Amin, M Brindha - Journal of Systems Architecture, 2022 - Elsevier
Waterways are used to monitor a variety of incredible occurrences that occur in an
underwater environment, such as weather impact surveillance, aquatic life, natural resource …

A Secure and Lightweight Three‐Factor Remote User Authentication Protocol for Future IoT Applications

BH Taher, H Liu, F Abedi, H Lu, AA Yassin… - Journal of …, 2021 - Wiley Online Library
With the booming integration of IoT technology in our daily life applications such as smart
industrial, smart city, smart home, smart grid, and healthcare, it is essential to ensure the …

Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction

BH Taher, S Jiang, AA Yassin, H Lu - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of things (IoT) is a system of smart technologies and services that mutually
communicate data between users and devices or between devices via the Internet. Since …

An Efficient Authentication and Key Agreement Scheme for the Internet of Underwater Things (IoUT) Environment

AM Almuhaideb, DM Al-Khulaifi - IEEE Access, 2024 - ieeexplore.ieee.org
The Internet of Underwater Things (IoUT) and Underwater Sensor Networks (UWSN) are
technologies that benefit multiple disciplines, including offshore exploration, aquaculture …

Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks

I Santos-González, A Rivero-García, M Burmester… - Information Systems, 2020 - Elsevier
Several three-party password authenticated key exchange (3-PAKE) protocols have recently
been proposed for heterogeneous wireless sensor networks (HWSN). These are efficient …

An enhanced user authentication and key agreement scheme for wireless sensor networks tailored for IoT

P Tyagi, S Kumari, BA Alzahrani, A Gupta, MH Yang - Sensors, 2022 - mdpi.com
A security protocol for wireless transmission is essential to defend sensitive information from
malicious enemies by providing a variety of facilities such as privacy of the user's …