Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022 - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …

A secure blockchain-based e-health records storage and sharing scheme

S Shamshad, K Mahmood, S Kumari… - Journal of Information …, 2020 - Elsevier
Due to the expeditious evolution of wearable technology and wireless mobile networks, the
tele-medicine and mobile medications have turned up into the Telecare Medicine …

A robust and anonymous patient monitoring system using wireless medical sensor networks

R Amin, SKH Islam, GP Biswas, MK Khan… - Future Generation …, 2018 - Elsevier
In wireless medical sensor network (WMSN), bio-sensors are implanted within the patient
body to sense the sensitive information of a patient which later on can be transmitted to the …

Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things

BD Deebak, F Al-Turjman - IEEE Journal on Selected Areas in …, 2020 - ieeexplore.ieee.org
Technological development expands the computation process of smart devices that adopt
the telecare medical information system (TMIS) to fulfill the demands of the healthcare …

A survey of authentication schemes in telecare medicine information systems

MU Aslam, A Derhab, K Saleem, H Abbas… - Journal of medical …, 2017 - Springer
E-Healthcare is an emerging field that provides mobility to its users. The protected health
information of the users are stored at a remote server (Telecare Medical Information System) …

A lightweight user authentication scheme for cloud-IoT based healthcare services

G Sharma, S Kalra - Iranian Journal of Science and Technology …, 2019 - Springer
With the ongoing revolution of cloud computing and Internet of Things, remote patient
monitoring has become feasible. These networking paradigms are widely used to provide …

A secure three factor based authentication scheme for health care systems using IoT enabled devices

SS Sahoo, S Mohanty, B Majhi - Journal of Ambient Intelligence and …, 2021 - Springer
In recent years, the Internet of Things (IoT) has gained increasing popularity due to the
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …

Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme

A Ostad-Sharif, H Arshad, M Nikooghadam… - Future Generation …, 2019 - Elsevier
Wireless sensor networks (WSNs) can be deployed in any unattended environment. With
new enhancements in internet of things (IoT) technology, authorized users are able to …

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

V Kumar, M Ahmad, D Mishra, S Kumari… - Vehicular …, 2020 - Elsevier
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …

Multi-factor user authentication scheme for IoT-based healthcare services

PK Dhillon, S Kalra - Journal of Reliable Intelligent Environments, 2018 - Springer
Due to the tremendous rise of the cloud computing and the Internet of Things (IoT)
paradigms, the possibility of remote monitoring of the patients in real time by a remote …