Security and privacy in IoT-cloud-based e-health systems—A comprehensive review

C Butpheng, KH Yeh, H Xiong - Symmetry, 2020 - mdpi.com
When the Internet and other interconnected networks are used in a health system, it is
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …

Blockchain-based reliable and efficient certificateless signature for IIoT devices

W Wang, H Xu, M Alazab, TR Gadekallu… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal
lifestyles and society operations into a novel digital mode, which brings tremendous …

Provably secure and lightweight certificateless signature scheme for IIoT environments

A Karati, SKH Islam, M Karuppiah - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, two technologies, the cloud computing and the Internet of Things (IoT), have
a synergistic effect in the modern organizations as digitization is a new business trend for …

Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT

Y Zhang, RH Deng, D Zheng, J Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …

Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments

H Xiong, Q Mei, Y Zhao - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
With the continuous development of the industrial Internet of Things (IIoT), many
organizations opt for storing the data collected by smart devices on a cloud server for saving …

A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things

M Malik, M Dutta, J Granjal - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …

A lightweight continuous authentication protocol for the Internet of Things

YH Chuang, NW Lo, CY Yang, SW Tang - Sensors, 2018 - mdpi.com
Modern societies are moving toward an information-oriented environment. To gather and
utilize information around people's modern life, tiny devices with all kinds of sensing devices …

An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment

X Jia, D He, Q Liu, KKR Choo - Ad Hoc Networks, 2018 - Elsevier
With the growing popularity of Internet of Things (IoT) in a wide range of applications,
ensuring the communication security of IoT devices is important. Certificateless signature …

A secure and efficient certificateless signature scheme for Internet of Things

D Xiang, X Li, J Gao, X Zhang - Ad Hoc Networks, 2022 - Elsevier
Abstract The Internet of Things (IoT) is a new technological innovation, which makes things
intelligent and our life more convenient. To ensure secure communication between smart …

A new provably secure certificateless signature scheme for Internet of Things

H Du, Q Wen, S Zhang, M Gao - Ad Hoc Networks, 2020 - Elsevier
With the rapid popularization of Internet of Things (IoT) in various fields, the security of the
IoT has been widely concerned. Security authentication technology is the foundation of the …