PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi… - Computer Networks, 2020 - Elsevier
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …

A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions

S Yu, Y Park - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Wireless medical sensor networks (WMSNs)-based medical systems are an emerging
paradigm of the Internet of Medical Things (IoMT) in which the patients and doctors can …

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu… - Future Generation …, 2018 - Elsevier
Abstract Wireless Sensor Network (WSN) is a very important part of Internet of Things (IoT),
especially in e-healthcare applications. Among them, wireless medical sensor networks …

Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks

W Wang, Q Chen, Z Yin, G Srivastava… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Due to the emergence of heterogeneous Internet of Medical Things (IoMT)(eg, wearable
health devices, smartwatch monitoring, and automated insulin delivery systems), large …

A secure authentication scheme framework for mobile-sinks used in the internet of drones applications

YK Ever - Computer Communications, 2020 - Elsevier
Within the last decade, communication technologies have evolved rapidly, and this caused
significant advancements for Internet of Things (IoT) applications and services. Unmanned …

Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …

Authentication schemes for healthcare applications using wireless medical sensor networks: A survey

AN Bahache, N Chikouche, F Mezrag - SN Computer Science, 2022 - Springer
Many applications are developed with the quick emergence of the Internet of things (IoT)
and wireless sensor networks (WSNs) in the health sector. Healthcare applications that use …

An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system

P Soni, AK Pal, SKH Islam - Computer methods and programs in …, 2019 - Elsevier
Background and objective: Wireless sensor network-based remote health-care systems are
becoming popular day by day with the rapid growth of Internet technologies and the …