Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …
billions of objects. As IoT applications continue to grow, they face several challenges …
Secure and lightweight user authentication scheme for cloud-assisted internet of things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …
Bindaas: Blockchain-based deep-learning as-a-service in healthcare 4.0 applications
P Bhattacharya, S Tanwar, U Bodkhe… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Electronic Health Records (EHRs) allows patients to control, share, and manage their health
records among family members, friends, and healthcare service providers using an open …
records among family members, friends, and healthcare service providers using an open …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Design of secure user authenticated key management protocol for generic IoT networks
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …
applications including smart home, smart city, smart grid, industrial Internet, connected …
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …
and control across heterogeneous network a reality, and has good prospects in industrial …
Context-sensitive access in industrial internet of things (IIoT) healthcare applications
F Al-Turjman, S Alturjman - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Industrial Internet of Things (IIoTs) is the fast growing network of interconnected things that
collects and exchange data using embedded sensors planted everywhere. Several IIoT …
collects and exchange data using embedded sensors planted everywhere. Several IIoT …
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of
electricity generation by providing the capability to monitor the consumption behavior of …
electricity generation by providing the capability to monitor the consumption behavior of …
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …