PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
Security and privacy issues in smart cities/industries: technologies, applications, and challenges
PM Rao, BD Deebak - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …
lives. Advanced information and communication technologies play a vital role in the …
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …
protocols based on public-key techniques have attracted much attention, providing secure …
A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …
A survey of internet of things (IoT) authentication schemes
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …
identification and another way for communication with each other. The spectrum of IoT …
A survey of compiler testing
Virtually any software running on a computer has been processed by a compiler or a
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
compiler-like tool. Because compilers are such a crucial piece of infrastructure for building …
Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …
having constraints of energy consumption, coverage, connectivity, and security. However …
A survey on supply chain security: Application areas, security threats, and solution architectures
The rapid improvement in the global connectivity standards has escalated the level of trade
taking place among different parties. Advanced communication standards are allowing the …
taking place among different parties. Advanced communication standards are allowing the …
Security in IoMT communications: A survey
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in
order to support real-time, remote patient monitoring and treatment. However, the …
order to support real-time, remote patient monitoring and treatment. However, the …
An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT
Emerging technologies rapidly change the essential qualities of modern societies in terms of
smart environments. To utilize the surrounding environment data, tiny sensing devices and …
smart environments. To utilize the surrounding environment data, tiny sensing devices and …