[HTML][HTML] Cybersecurity challenges in vehicular communications

Z El-Rewini, K Sadatsharan, DF Selvaraj… - Vehicular …, 2020 - Elsevier
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-
Everything (V2X) communication technologies mature, the necessity to secure …

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …

BSN-Care: A secure IoT-based modern healthcare system using body sensor network

P Gope, T Hwang - IEEE sensors journal, 2015 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the modern health care environment, the usage of IoT …

Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions

P Gope, J Lee, TQS Quek - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …

A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks

P Gope, T Hwang - IEEE Transactions on industrial electronics, 2016 - ieeexplore.ieee.org
User authentication in wireless sensor networks (WSN) is a critical security issue due to their
unattended and hostile deployment in the field. Since the sensor nodes are equipped with …

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

P Gope, R Amin, SKH Islam, N Kumar… - Future Generation …, 2018 - Elsevier
With the rapid development of device-to-device and machine-to-machine communication,
there is an exponential increase in the usage of various smart applications, such as …

Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …

Securing IoT-based RFID systems: A robust authentication protocol using symmetric cryptography

K Mansoor, A Ghani, SA Chaudhry, S Shamshirband… - Sensors, 2019 - mdpi.com
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the
underlying open architecture for communication between the RFID devices may lead to …

A new healthcare diagnosis system using an IoT-based fuzzy classifier with FPGA

S Satpathy, P Mohan, S Das, S Debbarma - The Journal of …, 2020 - Springer
In this study, an Internet of Things (IoT)-based analysis system is proposed, which can be
used to design a consumer electronic device. This IoT-based analysis system will alert the …

Untraceable sensor movement in distributed IoT infrastructure

P Gope, T Hwang - IEEE Sensors Journal, 2015 - ieeexplore.ieee.org
Recent advances in information and communication technologies and embedded systems
have given rise to a new disruptive technology, the Internet of Things (IoTs). IoT allows …