A review of multi-factor authentication in the Internet of Healthcare Things

T Suleski, M Ahmed, W Yang, E Wang - Digital Health, 2023 - journals.sagepub.com
Objective This review paper aims to evaluate existing solutions in healthcare authentication
and provides an insight into the technologies incorporated in Internet of Healthcare Things …

A review on smart home present state and challenges: linked to context-awareness internet of things (IoT)

ZA Almusaylim, N Zaman - Wireless networks, 2019 - Springer
The smart home is considered as an essential domain in Internet of Things (IoT)
applications, it is an interconnected home where all types of things interact with each other …

Access control for IoT: A survey of existing research, dynamic policies and future directions

K Ragothaman, Y Wang, B Rimal, M Lawrence - Sensors, 2023 - mdpi.com
Internet of Things (IoT) provides a wide range of services in domestic and industrial
environments. Access control plays a crucial role in granting access rights to users and …

Review of security and privacy for the Internet of Medical Things (IoMT)

G Hatzivasilis, O Soultatos, S Ioannidis… - … computing in sensor …, 2019 - ieeexplore.ieee.org
Day-by-day modern circular economy (CE) models gain ground and penetrate the traditional
business sectors. The Internet of Medical Things (IoMT) is the main enabler for this interplay …

Blockchain for IoT access control: Recent trends and future research directions

S Pal, A Dorri, R Jurdak - Journal of Network and Computer Applications, 2022 - Elsevier
With the rapid development of wireless sensor networks, smart devices, and traditional
information and communication technologies, there is tremendous growth in the use of …

Survey on existing authentication issues for cellular-assisted V2X communication

M Muhammad, GA Safdar - Vehicular Communications, 2018 - Elsevier
The integration of Internet of Things (IoT) into cellular network infrastructure is gaining much
attention from the research community and standardisation groups, where new cellular …

A security authorization scheme for smart home Internet of Things devices

BC Chifor, I Bica, VV Patriciu, F Pop - Future Generation Computer Systems, 2018 - Elsevier
Abstract The Internet of Things (IoT) is becoming an important factor in many areas of our
society. IoT brings intelligence to critical aspects like transportation, industry, payments …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

Privacy enhancing technologies in the Internet of Things: Perspectives and challenges

SC Cha, TY Hsu, Y **ang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) devices have brought much efficiency and convenience to our daily
life. However, the devices may collect a myriad of data from people without their consent …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …