PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

Security and privacy in IoT: a survey

PM Chanal, MS Kakkasageri - Wireless Personal Communications, 2020 - Springer
Abstract The Internet of Things (IoT) is a network of globally connected physical objects,
which are associated with each other via Internet. The IoT foresees the interconnection of …

A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm

M Kumar, P Mukherjee, S Verma, Kavita, J Shafi… - Scientific Reports, 2023 - nature.com
Abstract Industrial Internet of Things (IIoT) seeks more attention in attaining enormous
opportunities in the field of Industry 4.0. But there exist severe challenges related to data …

A survey on security and cryptographic perspective of Industrial-Internet-of-Things

N Mishra, SKH Islam, S Zeadally - Internet of Things, 2024 - Elsevier
Abstract The Industrial-Internet-of-Things (IIoT) powers several applications in the modern
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

S Cherbal, A Zier, S Hebal, L Louail… - The Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …

A privacy and session key based authentication scheme for medical IoT networks

P Kumar, L Chouhan - Computer Communications, 2021 - Elsevier
Due to rapid increase rate of smart medical devices, the existing security internet of things
(IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the …

A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices

S Kumari, M Singh, R Singh, H Tewari - Computer Networks, 2022 - Elsevier
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …

Authentication technology in internet of things and privacy security issues in typical application scenarios

J Zhao, H Hu, F Huang, Y Guo, L Liao - Electronics, 2023 - mdpi.com
This paper mainly summarizes three aspects of information security: Internet of Things (IoT)
authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …

A post-quantum compliant authentication scheme for IoT healthcare systems

M Adeli, N Bagheri, HR Maimani… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In an Internet of Things (IoT)-based healthcare system, medical IoT devices gather and
transmit critical patient data. Ensuring the security and privacy of medical data is paramount …

[HTML][HTML] Self-diagnosis platform via IOT-based privacy preserving medical data

G Muneeswari, SS Varun, R Hegde, SS Priya… - Measurement …, 2023 - Elsevier
Healthcare is one of the application domains that use IoT technology, where sensors and
IoT-enabled medical devices transmit data to healthcare specialists without the need for …