[HTML][HTML] A survey on the adoption of blockchain in iot: Challenges and solutions

MA Uddin, A Stranieri, I Gondal… - Blockchain: Research …, 2021 - Elsevier
Abstract Conventional Internet of Things (IoT) ecosystems involve data streaming from
sensors, through Fog devices to a centralized Cloud server. Issues that arise include privacy …

PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare

M Masud, GS Gaba, K Choudhary… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …

A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

Security and privacy in IoT-cloud-based e-health systems—A comprehensive review

C Butpheng, KH Yeh, H Xiong - Symmetry, 2020 - mdpi.com
When the Internet and other interconnected networks are used in a health system, it is
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …

RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones

M Tanveer, N Kumar, MM Hassan - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …

Provably secure ECC-based device access control and key agreement protocol for IoT environment

AK Das, M Wazid, AR Yannam, JJPC Rodrigues… - IEEE …, 2019 - ieeexplore.ieee.org
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …

BSKM-FC: Blockchain-based secured key management in a fog computing environment

NC Gowda, SS Manvi, B Malakreddy… - Future generation …, 2023 - Elsevier
With an increase in the number of devices in the edge layer connected to the fog server of
the fog computing environment, it is found that vulnerable and unauthorized activities are …

A secure three factor based authentication scheme for health care systems using IoT enabled devices

SS Sahoo, S Mohanty, B Majhi - Journal of Ambient Intelligence and …, 2021 - Springer
In recent years, the Internet of Things (IoT) has gained increasing popularity due to the
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …

Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …