A systematic security assessment and review of internet of things in the context of authentication
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
[HTML][HTML] Insights into Internet of Medical Things (IoMT): Data fusion, security issues and potential solutions
Abstract The Internet of Medical Things (IoMT) has created a wide range of opportunities for
knowledge exchange in numerous industries. The opportunities include patient …
knowledge exchange in numerous industries. The opportunities include patient …
Authentication in the internet of medical things: taxonomy, review, and open issues
The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely
connecting patients to healthcare providers through medical devices connected over the …
connecting patients to healthcare providers through medical devices connected over the …
Secure and lightweight user authentication scheme for cloud-assisted internet of things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
Attribute-based multiparty searchable encryption model for privacy protection of text data
The problems of data storage and sharing have been well solved with cloud storage.
However, the disadvantage is that users' messages are stored in the cloud without …
However, the disadvantage is that users' messages are stored in the cloud without …
CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment
Data is an essential asset of an organization or individual in this information age. Secure
and resource-efficient data communication has become paramount in the IoT-enabled cloud …
and resource-efficient data communication has become paramount in the IoT-enabled cloud …
CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing Internet of Things
Abstract Crowdsourcing Internet of Things (IoT) applications have resulted in the
widespread use of smart mobile devices, such as wearable devices and smartphones. E …
widespread use of smart mobile devices, such as wearable devices and smartphones. E …
Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments
S Ju, Y Park - Sensors, 2023 - mdpi.com
A paradigm that combines cloud computing and the Internet of Things (IoT) allows for more
impressive services to be provided to users while addressing storage and computational …
impressive services to be provided to users while addressing storage and computational …
A secure authentication framework for consumer mobile crowdsourcing networks
The Mobile crowdsourcing network (MCN) leverages collaborative intelligence to solve
complex tasks through group cooperation. It comprises three main components: the end …
complex tasks through group cooperation. It comprises three main components: the end …
[HTML][HTML] Lightweight authentication protocol for connected medical IoT through privacy-preserving access
With the rapid progress of communication technology, the Internet of Things (IoT) has
emerged as an essential element in our daily lives. Given that the IoT encompasses diverse …
emerged as an essential element in our daily lives. Given that the IoT encompasses diverse …