[HTML][HTML] A survey on the adoption of blockchain in iot: Challenges and solutions
Abstract Conventional Internet of Things (IoT) ecosystems involve data streaming from
sensors, through Fog devices to a centralized Cloud server. Issues that arise include privacy …
sensors, through Fog devices to a centralized Cloud server. Issues that arise include privacy …
PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
A survey of internet of things (IoT) authentication schemes
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …
identification and another way for communication with each other. The spectrum of IoT …
Security and privacy in IoT-cloud-based e-health systems—A comprehensive review
When the Internet and other interconnected networks are used in a health system, it is
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …
RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …
deployed for collecting sensitive data to be used in critical applications. The drones transmit …
Provably secure ECC-based device access control and key agreement protocol for IoT environment
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …
Things (IoT) environment, it is essential to design a secure device access control and key …
BSKM-FC: Blockchain-based secured key management in a fog computing environment
With an increase in the number of devices in the edge layer connected to the fog server of
the fog computing environment, it is found that vulnerable and unauthorized activities are …
the fog computing environment, it is found that vulnerable and unauthorized activities are …
A secure three factor based authentication scheme for health care systems using IoT enabled devices
In recent years, the Internet of Things (IoT) has gained increasing popularity due to the
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …
Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …