Internet of things security: challenges and key issues
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …
various objects and intelligent devices. The three important components of IoT are sensing …
Security in vehicular ad hoc networks: challenges and countermeasures
Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being
considered as integral parts of the automobile industry. As a subclass of MANETs, the …
considered as integral parts of the automobile industry. As a subclass of MANETs, the …
LAS-SG: An elliptic curve-based lightweight authentication scheme for smart grid environments
The communication among smart meters (SMs) and neighborhood area network (NAN)
gateways is a fundamental requisite for managing the energy consumption at the consumer …
gateways is a fundamental requisite for managing the energy consumption at the consumer …
LAKAF: Lightweight authentication and key agreement framework for smart grid network
Combination of sustainable resources and expanded developments in vitality utilization
have made new challenges for the traditional grid system. To confront these challenges, the …
have made new challenges for the traditional grid system. To confront these challenges, the …
Csef: cloud-based secure and efficient framework for smart medical system using ecc
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …
manner. There are various technologies used in smart architecture such as cloud …
Correcting “PALK: Password-based anonymous lightweight key agreement framework for smart grid”
SA Chaudhry - International Journal of Electrical Power & Energy …, 2021 - Elsevier
Very recently in 2020, Khan et al. proposed an authentication scheme (PALK) for the smart
grid infrastructure. Based on elliptic curve cryptography (ECC), symmetric hash functions …
grid infrastructure. Based on elliptic curve cryptography (ECC), symmetric hash functions …
A clogging resistant secure authentication scheme for fog computing services
Fog computing (FC) is an infrastructure consisting of decentralized computing, where
computing resources such as storage, applications, and data are scattered among the cloud …
computing resources such as storage, applications, and data are scattered among the cloud …
[HTML][HTML] ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor
Smart grid (SG) has been received significant attention due to various services such as
renewable energy and demand response. However, SG is fragile to various security attacks …
renewable energy and demand response. However, SG is fragile to various security attacks …
Lightweight authenticated key agreement for smart metering in smart grid
SH Baghestani, F Moazami… - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Nowadays, with the overconsumption of energy, researchers attempt to optimally manage
energy consumption and prevent it from being wasted. One beneficial way to manage …
energy consumption and prevent it from being wasted. One beneficial way to manage …
CKMIB: Construction of key agreement protocol for cloud medical infrastructure using blockchain
In the traditional medical healthcare system, each medical facility is responsible for
preserving its own records. Sharing such records with another medical establishment is …
preserving its own records. Sharing such records with another medical establishment is …