[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

A secure authentication protocol for internet of vehicles

CM Chen, B **ang, Y Liu, KH Wang - Ieee Access, 2019 - ieeexplore.ieee.org
An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting
messages for the vehicles on roads. However, as the data are transmitted in an insecure …

Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks

P Gope, AK Das, N Kumar… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

MS Farash, M Turkanović, S Kumari, M Hölbl - Ad Hoc Networks, 2016 - Elsevier
The concept of Internet of Things (IOT), which is already at our front doors, is that every
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

M Turkanović, B Brumen, M Hölbl - Ad Hoc Networks, 2014 - Elsevier
The idea of the Internet of Things (IOT) notion is that everything within the global network is
accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in …

An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT

BD Deebak, F Al-Turjman, M Aloqaily, O Alfandi - IEEE Access, 2019 - ieeexplore.ieee.org
Emerging technologies rapidly change the essential qualities of modern societies in terms of
smart environments. To utilize the surrounding environment data, tiny sensing devices and …

HomeChain: A blockchain-based secure mutual authentication system for smart homes

C Lin, D He, N Kumar, X Huang… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Increasingly, governments around the world, particularly in technologically advanced
countries, are exploring or implementing smart homes, or the related smart facilities for the …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks

CC Chang, HD Le - IEEE Transactions on wireless …, 2015 - ieeexplore.ieee.org
In 2014, Turkanovic et al. proposed a smart card-based authentication scheme for
heterogeneous ad hoc wireless sensor network. This scheme is very efficient since it …