Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters

AK Maurya, AK Das, SS Jamal, D Giri - Journal of Systems Architecture, 2021 - Elsevier
In this article, we propose an efficient Bloom filter and fuzzy extractor based user
authentication technique, which is significant for an Internet of Things (IoT)-enabled multi …

Connected and autonomous electric vehicles: Quality of experience survey and taxonomy

IW Damaj, DK Serhal, LA Hamandi, RN Zantout… - Vehicular …, 2021 - Elsevier
More than ever, the automotive industry is shifting towards electric vehicles since
environmental and sustainability concerns are becoming important to potential customers …

Information security: A review of information security issues and techniques

F Alkhudhayr, S Alfarraj, B Aljameeli… - 2019 2nd international …, 2019 - ieeexplore.ieee.org
Currently, corporations are more into using distributed systems and relying on networks and
communication facilities for transmitting critical and important information that needs to be …

Integrity verification mechanism of sensor data based on bilinear map accumulator

Y Ren, J Qi, Y Liu, J Wang, GJ Kim - ACM Transactions on Internet …, 2021 - dl.acm.org
With the explosive growth in the number of IoT devices, ensuring the integrity of the massive
data generated by these devices has become an important issue. Due to the limitation of …

CS-LAKA: A lightweight authenticated key agreement protocol with critical security properties for IoT environments

Y Guo, Y Guo - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Anonymity, robust synchronization, and perfect forward secrecy are the most important
security properties of authenticated key agreement (AKA) protocols. Designing AKA …

Intrusion detection model for IoT using recurrent kernel convolutional neural network

CU Om Kumar, S Marappan, B Murugeshan… - Wireless Personal …, 2023 - Springer
In communication and information technology, the Internet of Things (IoT) creates an
enormous amount of data traffic that permits data analysis to expose and detect unusual …

A comprehensive review of the internet of things security

M Ahmid, O Kazar - Journal of Applied Security Research, 2023 - Taylor & Francis
Abstract Currently, the Internet of Things (IoT) is the most contentious research subject.
However, IoT still suffers from many security problems, and the security concerns are …

IoT-based smart environment using intelligent intrusion detection system

G Kalnoor, S Gowrishankar - Soft Computing, 2021 - Springer
One of the most basic characteristic features of every smart device in a network based on the
Internet of Things (IoT) is to gather a larger set of data that has been created and then …

A provably secure mobile user authentication scheme for big data collection in IoT-enabled maritime intelligent transportation system

K Mahmood, J Ferzund, MA Saleem… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The emergence of contemporary technologies like cloud computing and the Internet of
Things (IoT) has revolutionized the trends in the cyber world to serve humanity. There are …

Secure and lightweight communication in heterogeneous IoT environments

F Siddiqui, J Beley, S Zeadally, G Braught - Internet of Things, 2021 - Elsevier
Abstract The Internet of Things (IoT) is a fast growing and rapidly evolving field. Everyday
objects from smart home appliances (eg toasters and refrigerators) to health monitoring …