ESCI-AKA: Enabling secure communication in an iot-enabled smart home environment using authenticated key agreement framework

H Alasmary, M Tanveer - Mathematics, 2023 - mdpi.com
Smart home environments are a vital component of the larger ecosystem within smart cities,
aiming to revolutionize residential living through the integration of Internet of Things (IoT) …

CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing Internet of Things

M Tanveer, MNM Bhutta, BA Alzahrani… - Arabian Journal for …, 2024 - Springer
Abstract Crowdsourcing Internet of Things (IoT) applications have resulted in the
widespread use of smart mobile devices, such as wearable devices and smartphones. E …

RDAF-IIoT: Reliable device-access framework for the industrial Internet of Things

H Alasmary - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) has experienced significant growth and is now a fundamental
part of the next-generation Internet. Alongside improving daily life, IoT devices generate and …

PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks

S Jayashree, SVN Santhosh Kumar - Peer-to-Peer Networking and …, 2024 - Springer
In the emerging world the Vehicular Ad-hoc Network (VANET) plays a vital role in the
Intelligent Transportation Sector (ITS). Basically VANET are exposed rapid topology …

Provably Secure Data Access Control Protocol for Cloud Computing

J Zhang, A Chen, P Zhang - Symmetry, 2023 - mdpi.com
Currently, cloud storage servers are controlled by a third-party administrator. This semi-
trusted approach gives rise to security concerns. Therefore, in cloud computing, some …

Image processing-based protection of privacy data in cloud using NTRU algorithm

K Karthika, RD Priya - Signal, Image and Video Processing, 2024 - Springer
The recent and fast improvements in communication networks and digital technologies have
facilitated the easy transmission and storage of multimedia information on various network …

[PDF][PDF] AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS

FM Salem, NF Zaky, EM Saad… - Jordanian Journal of …, 2024 - researchgate.net
Owing to the fast advancements of wireless communication, the telehealthcare platform
makes it possible for patients to access healthcare services online. However, creating a …

Redefining Crime Record Storage: An Advanced Architecture Harnessing the Power of Blockchain Technology

MMH Manik, AH Sagor, MA Habib… - … on Computer and …, 2023 - ieeexplore.ieee.org
Crime record storing is a significant task for law enforcement agencies. Often, they face
challenges in managing and inspecting the records efficiently and securely. Moreover …

Trends and Challenges in AIoT Implementation for Smart Home, Smart Buildings, and Smart Cities in Cloud Platforms

V Santhi, YNVS Sabareesh, PP Sudheer… - Artificial Intelligence of …, 2024 - igi-global.com
Smart homes, smart buildings, and smart cities increase the quality of living by creating a
world that is better and more secure, reducing dependency on human needs and efforts …

Enhanced Message Authentication Encryption Scheme Based on Physical-Layer Key Generation in Resource-Limited Internet of Things

Z Xing, B Zhao, B Xu, L Wang, G Ren, Z Liu - Available at SSRN 4639419 - papers.ssrn.com
Abstract The Internet of Things (IoT) is facing growing security challenges due to its
vulnerability. It is imperative to address the security issues using lightweight and efficient …