Integration of the internet of things and cloud: Security challenges and solutions–a review

C Surianarayanan, PR Chelliah - International Journal of Cloud …, 2023 - igi-global.com
The integration of IoT and cloud poses increased security challenges. Implementing security
mechanisms in IoT systems is challenging due to the availability of limited resources, large …

[引用][C] A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review

U Tariq, I Ahmed, AK Bashir, K Shaukat - Sensors, 2023 - MDPI

A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture

S Shukla, SJ Patel - Cluster Computing, 2024 - Springer
The emerging cloud infrastructure has escalated number of servers offering flexible and
diverse remote services through public channels. However, user authentication in …

TBVPAKE: An efficient and provably secure verifier-based PAKE protocol for IoT applications

M Qi, Z Cui, G Liang - Journal of Systems Architecture, 2023 - Elsevier
Password-authenticated key exchange (PAKE) is an important cryptographic primitive by
which two parties are allowed to authenticate each other and establish a cryptographically …

Using private set intersection to achieve privacy-preserving authorization for IoT systems

R Cai, L Chen, Y Zhu - Journal of Information Security and Applications, 2024 - Elsevier
We propose a novel approach to utilize private set intersection (PSI) to achieve privacy-
preserving authorization for IoT systems for the first time in this work. Our contribution …

Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review

NH Kamarudin, NHS Suhaimi, FA Nor Rashid… - Symmetry, 2024 - mdpi.com
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation
of robust security measures such as authentication has become paramount to safeguarding …

Vulnerability Assessment of Security Breach and Deadly Threat in Cloud Computing Environment

A Gupta, S Sinha, HK Singh… - 2023 IEEE 15th …, 2023 - ieeexplore.ieee.org
Cloud computing allows us to access available systems and pay for what we require
whenever needed. When there is access to the internet, it uses some techniques like …

Smart Farming with Improved Security using Ascon Encryption and Authentication

R Rahul, R Venkatesan… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
The evolution of smart farming through the integration of Internet of Things (IoT) technology
has ushered in a new era of precision agriculture, offering increased efficiency …

Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR

S Almarri, M Frikha - 2024 - preprints.org
Due to the rapid growth of the Internet of Things (IoT), securing communications between a
huge number of devices has become very difficult. Access controls and authentication …

MDIAM: A Multi-Device Identity Authentication Mechanism Based on Blockchain and Fuzzy Extractor

L Wang, Z Wang, L Zuo, H Liu - 2024 - researchsquare.com
With the widespread deployment of Internet of Things (IoT) devices, security issues with
identity authentication are becoming increasingly prominent. Traditional methods of identity …
为了回应用户根据美国数字千年版权法案 (DMCA) 向我们提交的投诉,我们已从此页上移除了 1 个结果。如果需要,您可以访问 LumenDatabase.org,查看导致结果遭到移除的 DMCA 投诉内容