A systematic security assessment and review of internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …

[HTML][HTML] Insights into Internet of Medical Things (IoMT): Data fusion, security issues and potential solutions

SF Ahmed, MSB Alam, S Afrin, SJ Rafa, N Rafa… - Information …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) has created a wide range of opportunities for
knowledge exchange in numerous industries. The opportunities include patient …

Authentication in the internet of medical things: taxonomy, review, and open issues

N Alsaeed, F Nadeem - Applied Sciences, 2022 - mdpi.com
The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely
connecting patients to healthcare providers through medical devices connected over the …

Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …

Attribute-based multiparty searchable encryption model for privacy protection of text data

S Yin, H Li, L Teng, AA Laghari, VV Estrela - Multimedia Tools and …, 2024 - Springer
The problems of data storage and sharing have been well solved with cloud storage.
However, the disadvantage is that users' messages are stored in the cloud without …

CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment

M Tanveer, AK Bashir, BA Alzahrani, A Albeshri… - Physical …, 2023 - Elsevier
Data is an essential asset of an organization or individual in this information age. Secure
and resource-efficient data communication has become paramount in the IoT-enabled cloud …

CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing Internet of Things

M Tanveer, MNM Bhutta, BA Alzahrani… - Arabian Journal for …, 2024 - Springer
Abstract Crowdsourcing Internet of Things (IoT) applications have resulted in the
widespread use of smart mobile devices, such as wearable devices and smartphones. E …

Provably Secure Lightweight Mutual Authentication and Key Agreement Scheme for Cloud-Based IoT Environments

S Ju, Y Park - Sensors, 2023 - mdpi.com
A paradigm that combines cloud computing and the Internet of Things (IoT) allows for more
impressive services to be provided to users while addressing storage and computational …

A secure authentication framework for consumer mobile crowdsourcing networks

A Aldosary, M Tanveer, M Ahmad… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The Mobile crowdsourcing network (MCN) leverages collaborative intelligence to solve
complex tasks through group cooperation. It comprises three main components: the end …

[HTML][HTML] Lightweight authentication protocol for connected medical IoT through privacy-preserving access

M Tanveer, SA Chelloug, M Alabdulhafith… - Egyptian Informatics …, 2024 - Elsevier
With the rapid progress of communication technology, the Internet of Things (IoT) has
emerged as an essential element in our daily lives. Given that the IoT encompasses diverse …