Systematic review of authentication and authorization advancements for the Internet of Things
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate
their direction, leaving space for a plethora of research directions and opportunities. Among …
their direction, leaving space for a plethora of research directions and opportunities. Among …
PASKE-IoD: Privacy-protecting authenticated key establishment for Internet of Drones
Unmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring
systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD) …
systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD) …
Mutual authentication with multi-factor in IoT-Fog-Cloud environment
Authentication of restricted memory devices presents significant problems since memory
consumption is high in mutual authentication using cryptographic protocols in IoT …
consumption is high in mutual authentication using cryptographic protocols in IoT …
Computationally efficient and secure anonymous authentication scheme for cloud users
In cloud computing, the combinations of various computing units are globally separated,
however, electronically connected. In recent years, the number of cloud users has …
however, electronically connected. In recent years, the number of cloud users has …
Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet‐of‐Things‐Fog environment
Security is a major challenge in the design and implementation of Internet‐of‐Things (IoT)‐
Fog networks and it can be resolved by an efficient authentication mechanism. As the …
Fog networks and it can be resolved by an efficient authentication mechanism. As the …
Lightweight two-factor authentication framework with privacy preserving for smart eHealth
PM Rao, BD Deebak - Peer-to-Peer Networking and Applications, 2024 - Springer
Abstract Unattended Wireless Sensor Networks (U-WSNs) use a non-stationary objects so-
called sink node (SN) or mobile sink (MS) to perform a few data computation processes …
called sink node (SN) or mobile sink (MS) to perform a few data computation processes …
Survey of symmetric and asymmetric key management schemes in the context of iot based healthcare system
Internet of Things (IoT) based real-time health monitoring system gains the attention of the
researchers as well as the business sectors. This service turns out to be a blessing to the …
researchers as well as the business sectors. This service turns out to be a blessing to the …
Information quality assessment for the medical wearable devices: validation study
Wearable systems are promising Internet of Things (IoT) solutions that have attracted
researchers' attention in the last decade. They are getting more consideration after the …
researchers' attention in the last decade. They are getting more consideration after the …
[PDF][PDF] PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones
SA CHAUDHRY, A NAUSHAD - academia.edu
Unmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring
systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD) …
systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD) …
[CITAZIONE][C] Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography
H Kumar - Turkish Journal of Computer and Mathematics …, 2021