Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …
it enables its consumers to improve their lifestyles and professionally keep up with the …
Secure and lightweight user authentication scheme for cloud-assisted internet of things
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …
Amassing the security: An enhanced authentication protocol for drone communications over 5G networks
At present, the great progress made by the Internet of Things (I o T) has led to the
emergence of the Internet of Drones (I o D). I o D is an extension of the I o T, which is used to …
emergence of the Internet of Drones (I o D). I o D is an extension of the I o T, which is used to …
A secure three-factor authentication scheme for IoT environments
Today, many users' extensive use of the Internet of Things (IoT) has made authentication an
inevitable issue in the IoT. The currently existing authentication methods are subjected to …
inevitable issue in the IoT. The currently existing authentication methods are subjected to …
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles
Z Li, Q Miao, SA Chaudhry… - International Journal of …, 2022 - journals.sagepub.com
The Internet of vehicles technology has developed rapidly in recent years and has become
increasingly important. The social Internet of vehicles provides better resources and services …
increasingly important. The social Internet of vehicles provides better resources and services …
A three-factor-based authentication scheme of 5G wireless sensor networks for IoT system
Internet of Things (IoT) is an expanding technology that facilitate physical devices to
interconnect each other over a public channel. Moreover, the security of the next-generation …
interconnect each other over a public channel. Moreover, the security of the next-generation …
LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment
AYF Alsahlani, A Popa - Journal of Network and Computer Applications, 2021 - Elsevier
Abstract Internet of Things (IoT) is a network of interconnected smart devices which provides
tremendous benefits and can be applied in various fields including, but not limited to …
tremendous benefits and can be applied in various fields including, but not limited to …
Survey on iot multi-factor authentication protocols: A systematic literature review
ZAAM Fneish, M El-Hajj… - 2023 11th International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of physical objects that is equipped with computers,
electronics, applications, sensors, and other devices. As the number of IoT devices and apps …
electronics, applications, sensors, and other devices. As the number of IoT devices and apps …
ESCI-AKA: Enabling secure communication in an iot-enabled smart home environment using authenticated key agreement framework
H Alasmary, M Tanveer - Mathematics, 2023 - mdpi.com
Smart home environments are a vital component of the larger ecosystem within smart cities,
aiming to revolutionize residential living through the integration of Internet of Things (IoT) …
aiming to revolutionize residential living through the integration of Internet of Things (IoT) …
Rotating behind security: A lightweight authentication protocol based on iot-enabled cloud computing environments
With the rapid development of technology based on the Internet of Things (IoT), numerous
IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role …
IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role …