[HTML][HTML] An Authentication Protocol for the Medical Internet of Things

N El-Meniawy, MRM Rizk, MA Ahmed, M Saleh - Symmetry, 2022 - mdpi.com
The progress in biomedical sensors, Internet of Things technologies, big data, cloud
computing, and artificial intelligence is leading the development of e-health medical …

[HTML][HTML] Distributed ledger technologies in vehicular mobile edge computing: a survey

M Jiang, X Qin - Complex & Intelligent Systems, 2022 - Springer
Blockchain-based systems, coined by distributed ledger technologies (DLTs), have rapidly
received tremendous interest from academia, industries, and governments. Recent literature …

Cross-program taint analysis for IoT systems

A Mandal, P Ferrara, Y Khlyebnikov, A Cortesi… - Proceedings of the 35th …, 2020 - dl.acm.org
Cross-program propagation of tainted data (such as sensitive information or user input) in an
interactive IoT system is listed among the OWASP IoT top 10 most critical security risks …

[PDF][PDF] Anonymous authentication protocols for iot based-healthcare systems: a survey

M Asassfeh, N Obeid, W Almobaideen - International Journal of …, 2020 - academia.edu
Nowadays, with the increase in chronic diseases and the aging population in all countries, it
has become a huge burden on hospitals to accommodate all patients and monitor them …

A survey on security issues and secure frameworks in internet of things (iot)

N Dongre, M Atique, ZA Shaik… - 2022 4th International …, 2022 - ieeexplore.ieee.org
Technology advancements blend to masses with diverse and heterogeneous environments.
The Internet of Things (IoT) and Cloud Computing has broken through reachability and …

Fiden: Intelligent fingerprint learning for attacker identification in the industrial Internet of Things

Y Chen, W Hu, M Alam, T Wu - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
This article studies the attacker identification issue in the Industrial Internet of Things (IIoT).
There have been already some work that uses device fingerprinting to identify attackers, and …

IoT enabled smart farming: a review

Y Akshatha, AS Poornima - 2022 6th International Conference …, 2022 - ieeexplore.ieee.org
Agriculture is giving the major contribution to the Indian economy. The rapid growth in
digitization forced to convert many marketing sectors to adapt the modern technologies. The …

An authentication technique based on oauth 2.0 protocol for internet of things (IoT) network

J Khan, J ping Li, I Ali, S Parveen… - … on wavelet active …, 2018 - ieeexplore.ieee.org
Internet of Things (loT) is the fast-growing emerging technology and it is making our daily life
(activities) easier and better. The loT is connecting millions of sensors and heterogeneous …

A privacy-preserving efficient location-sharing scheme for mobile online social network applications

M Bhattacharya, S Roy, K Mistry, HPH Shum… - IEEE …, 2020 - ieeexplore.ieee.org
The rapid development of mobile internet technology and the better availability of GPS have
made mobile online social networks (mOSNs) more popular than traditional online social …

[PDF][PDF] Accessing Cloud Services Using Token based Framework for IoT Devices.

NS Yadav, M Rao, DV Parameswari, KLS Soujanya… - Webology, 2021 - webology.org
Nowadays cloud environments are used by many business service sectors like healthcare,
retail marketing, banking, and many business fields. At the same time, the usage of Internet …