Systematic review of authentication and authorization advancements for the Internet of Things

M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny - Sensors, 2022 - mdpi.com
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate
their direction, leaving space for a plethora of research directions and opportunities. Among …

PASKE-IoD: Privacy-protecting authenticated key establishment for Internet of Drones

M Tanveer, H Shah, SA Chaudhry, A Naushad - IEEE Access, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring
systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD) …

Mutual authentication with multi-factor in IoT-Fog-Cloud environment

L Loffi, CM Westphall, LD Grüdtner… - Journal of Network and …, 2021 - Elsevier
Authentication of restricted memory devices presents significant problems since memory
consumption is high in mutual authentication using cryptographic protocols in IoT …

Computationally efficient and secure anonymous authentication scheme for cloud users

A Arasan, R Sadaiyandi, F Al-Turjman… - Personal and Ubiquitous …, 2024 - Springer
In cloud computing, the combinations of various computing units are globally separated,
however, electronically connected. In recent years, the number of cloud users has …

Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet‐of‐Things‐Fog environment

U Jain, S Pirasteh, M Hussain - Concurrency and Computation …, 2023 - Wiley Online Library
Security is a major challenge in the design and implementation of Internet‐of‐Things (IoT)‐
Fog networks and it can be resolved by an efficient authentication mechanism. As the …

Lightweight two-factor authentication framework with privacy preserving for smart eHealth

PM Rao, BD Deebak - Peer-to-Peer Networking and Applications, 2024 - Springer
Abstract Unattended Wireless Sensor Networks (U-WSNs) use a non-stationary objects so-
called sink node (SN) or mobile sink (MS) to perform a few data computation processes …

Survey of symmetric and asymmetric key management schemes in the context of iot based healthcare system

K Sowjanya, M Dasgupta - 2020 First International Conference …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) based real-time health monitoring system gains the attention of the
researchers as well as the business sectors. This service turns out to be a blessing to the …

Information quality assessment for the medical wearable devices: validation study

R Alrae, M AbuTalib, Q Nasir - 2020 14th International …, 2020 - ieeexplore.ieee.org
Wearable systems are promising Internet of Things (IoT) solutions that have attracted
researchers' attention in the last decade. They are getting more consideration after the …

[PDF][PDF] PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones

SA CHAUDHRY, A NAUSHAD - academia.edu
Unmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring
systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD) …

[CITAZIONE][C] Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography

H Kumar - Turkish Journal of Computer and Mathematics …, 2021