A survey on security and cryptographic perspective of Industrial-Internet-of-Things

N Mishra, SKH Islam, S Zeadally - Internet of Things, 2024 - Elsevier
Abstract The Industrial-Internet-of-Things (IIoT) powers several applications in the modern
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …

A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles

Z Xu, W Liang, KC Li, J Xu, H ** - Journal of Parallel and Distributed …, 2021 - Elsevier
A fundamental layer of smart cities, the Internet of Vehicles (IoV) can significantly improve
transportation efficiency, reduce energy consumption, and traffic accidents. However …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment

M Wazid, AK Das, N Kumar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment

M Wazid, AK Das, V Bhat, AV Vasilakos - Journal of Network and Computer …, 2020 - Elsevier
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …

Design of secure user authenticated key management protocol for generic IoT networks

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …

Secure remote user authenticated key establishment protocol for smart home environment

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …

Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks

P Gope, AK Das, N Kumar… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …

Government regulations in cyber security: Framework, standards and recommendations

J Srinivas, AK Das, N Kumar - Future generation computer systems, 2019 - Elsevier
Cyber security refers to the protection of Internet-connected systems, such as hardware,
software as well as data (information) from cyber attacks (adversaries). A cyber security …

Provably secure authenticated key agreement scheme for smart grid

V Odelu, AK Das, M Wazid… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Due to the rapid development of wireless communication systems, authentication becomes
a key security component in smart grid environments. Authentication then plays an important …