Healthcare internet of things: Security threats, challenges and future research directions
Internet of Things (IoT) applications are switching from general to precise in different
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …
protocols based on public-key techniques have attracted much attention, providing secure …
Two birds with one stone: Two-factor authentication with security beyond conventional bound
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …
authentication has been a subject of intensive research in the past two decades, and …
Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …
having constraints of energy consumption, coverage, connectivity, and security. However …
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
The concept of Internet of Things (IOT), which is already at our front doors, is that every
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …
information about the physical conditions of patients. Due to the openness and mobility of …
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
Abstract Wireless Sensor Network (WSN) is a very important part of Internet of Things (IoT),
especially in e-healthcare applications. Among them, wireless medical sensor networks …
especially in e-healthcare applications. Among them, wireless medical sensor networks …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
Authenticated key agreement scheme for fog-driven IoT healthcare system
The convergence of cloud computing and Internet of Things (IoT) is partially due to the
pragmatic need for delivering extended services to a broader user base in diverse …
pragmatic need for delivering extended services to a broader user base in diverse …