A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …
People, processes, and things are connected with the Internet through IoT. With the …
Blockchain-empowered decentralized horizontal federated learning for 5G-enabled UAVs
C Feng, B Liu, K Yu, SK Goudos… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Motivated by Industry 4.0, 5G-enabled unmanned aerial vehicles (UAVs; also known as
drones) are widely applied in various industries. However, the open nature of 5G networks …
drones) are widely applied in various industries. However, the open nature of 5G networks …
Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones
C Feng, B Liu, Z Guo, K Yu, Z Qin… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
While 5G can facilitate high-speed Internet access and make over-the-horizon control a
reality for unmanned aerial vehicles (UAVs; also known as drones), there are also potential …
reality for unmanned aerial vehicles (UAVs; also known as drones), there are also potential …
A novel architecture combining oracle with decentralized learning for iiot
The rapid development of digital technology is resha** the architecture of the Industrial
Internet of Things (IIoT). The traditional architecture cannot process vast amounts of data …
Internet of Things (IIoT). The traditional architecture cannot process vast amounts of data …
Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT
Industrial Internet of Things (IIoT) has emerged as a prospective technology that improves
the productivity and automation level for industrial applications. Devices from cooperative …
the productivity and automation level for industrial applications. Devices from cooperative …
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain
The current IoT platform is vulnerable to remote device hijacking and substitution attacks,
primarily due to weak authentication and authorization mechanisms between IoT devices …
primarily due to weak authentication and authorization mechanisms between IoT devices …
A blockchain-based multi-CA cross-domain authentication scheme in decentralized autonomous network
M Wang, L Rui, Y Yang, Z Gao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The continuous development of network technology has driven the emergence of smart
devices, and the demand for smart devices interconnection has increased sharply, which …
devices, and the demand for smart devices interconnection has increased sharply, which …
A cross-domain authentication scheme based on cooperative blockchains functioning with revocation for medical consortiums
Regional medical consortium systems facilitates medical information sharing. However,
many security issues exposed by the dominant centralized architectures, such as single …
many security issues exposed by the dominant centralized architectures, such as single …
Secure and scalable cross-domain data sharing in zero-trust cloud-edge-end environment based on sharding blockchain
The cloud-edge-end architecture is suitable for many essential scenarios, such as 5 G, the
Internet of Things (IoT), and mobile edge computing. Under this architecture, cross-domain …
Internet of Things (IoT), and mobile edge computing. Under this architecture, cross-domain …
Is 5G handover secure and private? A survey
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …