Federated learning for internet of things: Recent advances, taxonomy, and open challenges

LU Khan, W Saad, Z Han, E Hossain… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) will be ripe for the deployment of novel machine learning
algorithm for both network and application management. However, given the presence of …

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …

LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT

SF Aghili, H Mala, M Shojafar, P Peris-Lopez - future generation computer …, 2019 - Elsevier
The use of the Internet of Things (IoT) in the electronic health (e-health) management
systems brings with it many challenges, including secure communications through insecure …

A lightweight anonymous user authentication and key establishment scheme for wearable devices

A Gupta, M Tripathi, TJ Shaikh, A Sharma - Computer Networks, 2019 - Elsevier
The paradigm of the Internet of Things (IoT) is a system of interconnected objects that can be
accessed globally with the help of the Internet. IoT has numerous applications including …

A lightweight authenticated key agreement protocol using fog nodes in social internet of vehicles

TY Wu, X Guo, L Yang, Q Meng… - Mobile Information …, 2021 - Wiley Online Library
Recently, there has been rapid growth in the Internet of things, the Internet of vehicles, fog
computing, and social Internet of vehicles (SIoV), which can generate large amounts of real …

PSL-MAAKA: Provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in internet of medical things

J Li, Z Su, D Guo, KKR Choo, Y Ji - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Designing efficient and secure mutual authentication and key agreement (MAAKA) protocols
for Internet of Medical Things (IoMT) has been shown to be challenging, mainly due to the …

Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks

AH Adavoudi-Jolfaei, M Ashouri-Talouki… - Peer-to-Peer Networking …, 2019 - Springer
Wireless sensor networks (WSNs) play an important role and support a variety of real time
applications, such as healthcare monitoring, military surveillance, vehicular tracking and, so …

BENS− B5G: blockchain-enabled network slicing in 5G and beyond-5G (B5G) networks

S Singh, CR Babu, K Ramana, IH Ra, B Yoon - Sensors, 2022 - mdpi.com
Fifth-generation (5G) technology is anticipated to allow a slew of novel applications across a
variety of industries. The wireless communication of the 5G and Beyond-5G (B5G) networks …

A Secure and Lightweight Three‐Factor Remote User Authentication Protocol for Future IoT Applications

BH Taher, H Liu, F Abedi, H Lu, AA Yassin… - Journal of …, 2021 - Wiley Online Library
With the booming integration of IoT technology in our daily life applications such as smart
industrial, smart city, smart home, smart grid, and healthcare, it is essential to ensure the …

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps

JL Li, WG Zhang, S Kumari, KKR Choo… - Transactions on …, 2018 - Wiley Online Library
A characteristic of wireless sensor networks (WSNs) different from traditional networks is that
WSNs are vulnerable to various types of attacks because of their distinctive features …