[HTML][HTML] Cybersecurity challenges in vehicular communications
Z El-Rewini, K Sadatsharan, DF Selvaraj… - Vehicular …, 2020 - Elsevier
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-
Everything (V2X) communication technologies mature, the necessity to secure …
Everything (V2X) communication technologies mature, the necessity to secure …
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …
People, processes, and things are connected with the Internet through IoT. With the …
BSN-Care: A secure IoT-based modern healthcare system using body sensor network
P Gope, T Hwang - IEEE sensors journal, 2015 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the modern health care environment, the usage of IoT …
Internet of Things (IoT). In the modern health care environment, the usage of IoT …
Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …
requirements for implementation of Internet-of-Things applications. It helps to solve the …
A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks
P Gope, T Hwang - IEEE Transactions on industrial electronics, 2016 - ieeexplore.ieee.org
User authentication in wireless sensor networks (WSN) is a critical security issue due to their
unattended and hostile deployment in the field. Since the sensor nodes are equipped with …
unattended and hostile deployment in the field. Since the sensor nodes are equipped with …
Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment
With the rapid development of device-to-device and machine-to-machine communication,
there is an exponential increase in the usage of various smart applications, such as …
there is an exponential increase in the usage of various smart applications, such as …
Csef: cloud-based secure and efficient framework for smart medical system using ecc
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …
manner. There are various technologies used in smart architecture such as cloud …
Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the
underlying open architecture for communication between the RFID devices may lead to …
underlying open architecture for communication between the RFID devices may lead to …
A new healthcare diagnosis system using an IoT-based fuzzy classifier with FPGA
In this study, an Internet of Things (IoT)-based analysis system is proposed, which can be
used to design a consumer electronic device. This IoT-based analysis system will alert the …
used to design a consumer electronic device. This IoT-based analysis system will alert the …
Untraceable sensor movement in distributed IoT infrastructure
P Gope, T Hwang - IEEE Sensors Journal, 2015 - ieeexplore.ieee.org
Recent advances in information and communication technologies and embedded systems
have given rise to a new disruptive technology, the Internet of Things (IoTs). IoT allows …
have given rise to a new disruptive technology, the Internet of Things (IoTs). IoT allows …