TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment

J Srinivas, AK Das, N Kumar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …

Artificial intelligence-based sensors for next generation IoT applications: A review

SC Mukhopadhyay, SKS Tyagi… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Sensors play a vital role in our daily lives and are an essential component for Internet of
Things (IoT) based systems as they enable the IoT to collect data to take smart and …

A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures

A Yazdinejad, B Zolfaghari, A Azmoodeh… - Applied Sciences, 2021 - mdpi.com
In recent years, Smart Farming (SF) and Precision Agriculture (PA) have attracted attention
from both the agriculture industry as well as the research community. Altogether, SF and PA …

Government regulations in cyber security: Framework, standards and recommendations

J Srinivas, AK Das, N Kumar - Future generation computer systems, 2019 - Elsevier
Cyber security refers to the protection of Internet-connected systems, such as hardware,
software as well as data (information) from cyber attacks (adversaries). A cyber security …

Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges

A Vangala, AK Das, V Chamola, V Korotaev… - Cluster …, 2023 - Springer
Agricultural industry is one of the most vital industries that has a major contribution to the
economy due to its share in the Gross Domestic Product (GDP) and as a source of …

Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges

S Pundir, M Wazid, DP Singh, AK Das… - IEEE …, 2019 - ieeexplore.ieee.org
As we all know that the technology is projected to be next to humans very soon because of
its holistic growth. Now-a-days, we see a lot of applications that are making our lives …

IoMT malware detection approaches: analysis and research challenges

M Wazid, AK Das, JJPC Rodrigues, S Shetty… - IEEE …, 2019 - ieeexplore.ieee.org
The advancement in Information and Communications Technology (ICT) has changed the
entire paradigm of computing. Because of such advancement, we have new types of …

Security requirements for the internet of things: A systematic approach

S Pal, M Hitchens, T Rabehaja, S Mukhopadhyay - Sensors, 2020 - mdpi.com
There has been a tremendous growth in the number of smart devices and their applications
(eg, smart sensors, wearable devices, smart phones, smart cars, etc.) in use in our everyday …

Smart healthcare: Challenges and potential solutions using internet of things (IoT) and big data analytics

S Zeadally, F Siddiqui, Z Baig, A Ibrahim - PSU research review, 2020 - emerald.com
Purpose The aim of this paper is to identify some of the challenges that need to be
addressed to accelerate the deployment and adoption of smart health technologies for …

Authentication in cloud-driven IoT-based big data environment: Survey and outlook

M Wazid, AK Das, R Hussain, G Succi… - Journal of systems …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is composed of different networked objects (ie, smart
devices) which are interconnected to gather, process, refine, and exchange meaningful data …