A survey on mobile augmented reality with 5G mobile edge computing: Architectures, applications, and technical aspects

Y Siriwardhana, P Porambage… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Augmented Reality (AR) technology enhances the human perception of the world by
combining the real environment with the virtual space. With the explosive growth of powerful …

Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare

M Masud, GS Gaba, K Choudhary… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …

A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care

M Masud, GS Gaba, S Alqahtani… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …

The duo of artificial intelligence and big data for industry 4.0: Applications, techniques, challenges, and future research directions

SK Jagatheesaperumal, M Rahouti… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The increasing need for economic, safe, and sustainable smart manufacturing combined
with novel technological enablers has paved the way for artificial intelligence (AI) and big …

Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions

VR Kebande, AI Awad - ACM Computing Surveys, 2024 - dl.acm.org
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …

[HTML][HTML] An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0

O Chakir, A Rehaimi, Y Sadqi, M Krichen… - Journal of King Saud …, 2023 - Elsevier
Cybersecurity attacks that target software have become profitable and popular targets for
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …

Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare

GS Gaba, M Hedabou, P Kumar, A Braeken… - Sustainable Cities and …, 2022 - Elsevier
Upgradation of technologies for sustainable smart cities has led to rapid growth in Internet of
Things (IoT) applications, including e-healthcare services wherein smart devices collect …

A robust and lightweight secure access scheme for cloud based E-healthcare services

M Masud, GS Gaba, K Choudhary, R Alroobaea… - Peer-to-peer Networking …, 2021 - Springer
Traditional healthcare services have transitioned into modern healthcare services where
doctors remotely diagnose the patients. Cloud computing plays a significant role in this …

A smart secure healthcare monitoring system with Internet of Medical Things

S Shreya, K Chatterjee, A Singh - Computers and Electrical Engineering, 2022 - Elsevier
The new era of information technologies made smart healthcare by including edge, Internet
of Things (loT), Internet of Medical Things (IoMT), cloud computing etc. This adaptation has …

[HTML][HTML] A user-centric privacy-preserving authentication protocol for IoT-AmI environments

M Masud, GS Gaba, P Kumar, A Gurtov - Computer Communications, 2022 - Elsevier
Abstract Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare
professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has …