An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …
securing the communication channels of connected Internet of Things (IoT) devices …
Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions
Challenges faced in network security have significantly steered the deployment timeline of
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain
The Metaverse is an evolving technology that leverages the Internet infrastructure and the
massively connected Internet of Everything (IoE) to create an immersive virtual world. In the …
massively connected Internet of Everything (IoE) to create an immersive virtual world. In the …
On the applications of blockchain in FinTech: advancements and opportunities
Financial Technology (FinTech) has expanded beyond simple mobile banking to online
money transfers, crowdfunding, and managing individual investments. This reinforces the …
money transfers, crowdfunding, and managing individual investments. This reinforces the …
A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …
Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …
MS‐ADS: multistage spectrogram image‐based anomaly detection system for IoT security
The innovative computing idea of Internet‐of‐Things (IoT) architecture has gained
tremendous popularity over the last decade, resulting in an exponential increase in the …
tremendous popularity over the last decade, resulting in an exponential increase in the …
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
Software‐defined networking (SDN) has received considerable attention and adoption
owing to its inherent advantages, such as enhanced scalability, increased adaptability, and …
owing to its inherent advantages, such as enhanced scalability, increased adaptability, and …
S-ADS: spectrogram image-based anomaly detection system for IoT networks
The Internet of things (IoT) is the smart concept of connecting devices equipped with various
sensors, actuators, memory, computational and communicational capabilities using the …
sensors, actuators, memory, computational and communicational capabilities using the …
Future Directions for Secure IoT Frameworks: Insights from Blockchain-Based Solutions: A Comprehensive Review and Future Analysis
The main aim of this research is to provide a methodical review of secure frameworks in IoT
using blockchain technology. Because of its decentralized security and resistance to attacks …
using blockchain technology. Because of its decentralized security and resistance to attacks …