PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
Security and privacy in IoT: a survey
PM Chanal, MS Kakkasageri - Wireless Personal Communications, 2020 - Springer
Abstract The Internet of Things (IoT) is a network of globally connected physical objects,
which are associated with each other via Internet. The IoT foresees the interconnection of …
which are associated with each other via Internet. The IoT foresees the interconnection of …
A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm
Abstract Industrial Internet of Things (IIoT) seeks more attention in attaining enormous
opportunities in the field of Industry 4.0. But there exist severe challenges related to data …
opportunities in the field of Industry 4.0. But there exist severe challenges related to data …
A survey on security and cryptographic perspective of Industrial-Internet-of-Things
Abstract The Industrial-Internet-of-Things (IIoT) powers several applications in the modern
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …
world: smart city, smart grid, smart manufacturing, smart logistics management, etc. The …
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …
to access linked multimedia devices. The development of IoT and its ubiquitous application …
A privacy and session key based authentication scheme for medical IoT networks
P Kumar, L Chouhan - Computer Communications, 2021 - Elsevier
Due to rapid increase rate of smart medical devices, the existing security internet of things
(IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the …
(IoT) protocols cannot guaranty to perform better in-term of various threats. In this paper, the …
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …
Authentication technology in internet of things and privacy security issues in typical application scenarios
J Zhao, H Hu, F Huang, Y Guo, L Liao - Electronics, 2023 - mdpi.com
This paper mainly summarizes three aspects of information security: Internet of Things (IoT)
authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …
authentication technology, Internet of Vehicles (IoV) trust management, and IoV privacy …
A post-quantum compliant authentication scheme for IoT healthcare systems
In an Internet of Things (IoT)-based healthcare system, medical IoT devices gather and
transmit critical patient data. Ensuring the security and privacy of medical data is paramount …
transmit critical patient data. Ensuring the security and privacy of medical data is paramount …
[HTML][HTML] Self-diagnosis platform via IOT-based privacy preserving medical data
Healthcare is one of the application domains that use IoT technology, where sensors and
IoT-enabled medical devices transmit data to healthcare specialists without the need for …
IoT-enabled medical devices transmit data to healthcare specialists without the need for …