Federated learning for internet of things: Recent advances, taxonomy, and open challenges
The Internet of Things (IoT) will be ripe for the deployment of novel machine learning
algorithm for both network and application management. However, given the presence of …
algorithm for both network and application management. However, given the presence of …
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …
People, processes, and things are connected with the Internet through IoT. With the …
LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT
The use of the Internet of Things (IoT) in the electronic health (e-health) management
systems brings with it many challenges, including secure communications through insecure …
systems brings with it many challenges, including secure communications through insecure …
A lightweight anonymous user authentication and key establishment scheme for wearable devices
The paradigm of the Internet of Things (IoT) is a system of interconnected objects that can be
accessed globally with the help of the Internet. IoT has numerous applications including …
accessed globally with the help of the Internet. IoT has numerous applications including …
A lightweight authenticated key agreement protocol using fog nodes in social internet of vehicles
TY Wu, X Guo, L Yang, Q Meng… - Mobile Information …, 2021 - Wiley Online Library
Recently, there has been rapid growth in the Internet of things, the Internet of vehicles, fog
computing, and social Internet of vehicles (SIoV), which can generate large amounts of real …
computing, and social Internet of vehicles (SIoV), which can generate large amounts of real …
PSL-MAAKA: Provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in internet of medical things
Designing efficient and secure mutual authentication and key agreement (MAAKA) protocols
for Internet of Medical Things (IoMT) has been shown to be challenging, mainly due to the …
for Internet of Medical Things (IoMT) has been shown to be challenging, mainly due to the …
Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
Wireless sensor networks (WSNs) play an important role and support a variety of real time
applications, such as healthcare monitoring, military surveillance, vehicular tracking and, so …
applications, such as healthcare monitoring, military surveillance, vehicular tracking and, so …
BENS− B5G: blockchain-enabled network slicing in 5G and beyond-5G (B5G) networks
Fifth-generation (5G) technology is anticipated to allow a slew of novel applications across a
variety of industries. The wireless communication of the 5G and Beyond-5G (B5G) networks …
variety of industries. The wireless communication of the 5G and Beyond-5G (B5G) networks …
A Secure and Lightweight Three‐Factor Remote User Authentication Protocol for Future IoT Applications
With the booming integration of IoT technology in our daily life applications such as smart
industrial, smart city, smart home, smart grid, and healthcare, it is essential to ensure the …
industrial, smart city, smart home, smart grid, and healthcare, it is essential to ensure the …
Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps
A characteristic of wireless sensor networks (WSNs) different from traditional networks is that
WSNs are vulnerable to various types of attacks because of their distinctive features …
WSNs are vulnerable to various types of attacks because of their distinctive features …