Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions

R Chaudhary, GS Aujla, N Kumar… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Due to its widespread popularity and usage in many applications (smart transport, energy
management, e-healthcare, smart ecosystem, and so on), the Internet of Things (IoT) has …

Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions

P Bagga, AK Das, V Chamola, M Guizani - Telecommunication Systems, 2022 - Springer
With rapid advancements in the technology, almost all the devices around are becoming
smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added …

A blockchain based data aggregation and group authentication scheme for electronic medical system

CT Li, DH Shih, CC Wang, CL Chen, CC Lee - IEEE Access, 2020 - ieeexplore.ieee.org
In recent years, due to the rapid development of information techniques and network
technologies, more and more medical documents have been replaced by electronic files for …

Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment

S Banerjee, S Roy, V Odelu, AK Das… - Journal of Information …, 2020 - Elsevier
With the ever-increasing rate of adoption of internet-enabled smart devices, the allure of
greater integration of technologies, such as smart home, smart city, and smart grid into …

Healthcare internet of things: Security threats, challenges and future research directions

M Adil, MK Khan, N Kumar, M Attique… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications are switching from general to precise in different
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …

Analysis on functionalities and security features of Internet of Things related protocols

A Rizzardi, S Sicari, A Coen-Porisini - Wireless Networks, 2022 - Springer
Abstract The Internet of Things (IoT) paradigm is characterized by the adoption of different
protocols and standards to enable communications among heterogeneous and, often …

A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things

M Malik, M Dutta, J Granjal - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …

RETRACTED ARTICLE: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers

SS Rani, JA Alzubi, SK Lakshmanaprabu… - Multimedia Tools and …, 2020 - Springer
The ever-growing advancement in communication innovation of modern smart objects
carries with it a new era of improvement for the Internet of Things (IoT) based networks. The …

A lightweight privacy-preserving communication protocol for heterogeneous IoT environment

X Luo, L Yin, C Li, C Wang, F Fang, C Zhu… - IEEE Access, 2020 - ieeexplore.ieee.org
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life,
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …

A physically secure, lightweight three-factor and anonymous user authentication protocol for IoT

Z Liu, C Guo, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things has remarkable effects in human's daily life. It is important for users and
sensors to securely access data collected by low-cost sensors via Internet in real-time IoT …