A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

Healthcare Internet of Things: Security Threats, Challenges and Future Research Directions

M Adil, MK Khan, N Kumar, M Attique… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications are switching from general to precise in different
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …

Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things

A Nag, MM Hassan, A Das, A Sinha… - Transactions on …, 2024 - Wiley Online Library
Abstract The term “Internet of Things”(IoT) represents a vast interconnected network
comprising ordinary objects enhanced with electronics like sensors, actuators, and wireless …

A provable secure and efficient authentication framework for smart manufacturing industry

M Hammad, A Badshah, G Abbas, H Alasmary… - IEEE …, 2023 - ieeexplore.ieee.org
Smart manufacturing is transforming the manufacturing industry by enhancing productivity
and quality, driving growth in the global economy. The Internet of Things (IoT) has played a …

Internet of Things and Wireless Sensor Networks for Smart Agriculture Applications-A Survey

MN Mowla, N Mowla, AFMS Shah, K Rabie… - IEEE …, 2023 - ieeexplore.ieee.org
The increasing food scarcity necessitates sustainable agriculture achieved through
automation to meet the growing demand. Integrating the Internet of Things (IoT) and …

Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review

NH Kamarudin, NHS Suhaimi, FA Nor Rashid… - Symmetry, 2024 - mdpi.com
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation
of robust security measures such as authentication has become paramount to safeguarding …

[HTML][HTML] Lightweight authentication protocol for connected medical IoT through privacy-preserving access

M Tanveer, SA Chelloug, M Alabdulhafith… - Egyptian Informatics …, 2024 - Elsevier
With the rapid progress of communication technology, the Internet of Things (IoT) has
emerged as an essential element in our daily lives. Given that the IoT encompasses diverse …

Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol

K Eledlebi, A Alzubaidi, E Damiani… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The rapid integration of IoT devices into everyday decision-making processes underscores
the need for continuous user authentication and data integrity checking during network …

Smart Contract-Based Access Control Framework for Internet of Things Devices

MR Hasan, A Alazab, SB Joy, MN Uddin, MA Uddin… - Computers, 2023 - mdpi.com
The Internet of Things (IoT) has recently attracted much interest from researchers due to its
diverse IoT applications. However, IoT systems encounter additional security and privacy …

IPCAS: An improved conditional privacy-preserving certificateless aggregate signature scheme without bilinear pairing for VANETs

W Wu, F Ye - Journal of Systems Architecture, 2024 - Elsevier
Recently, Gong et al. proposed a Certificateless Aggregate Signature (CLAS) scheme
(shorted by PCAS) with conditional privacy-preserving without bilinear pairing for Vehicular …