The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …
GASE: A lightweight group authentication scheme with key agreement for edge computing applications
Motivated by the fact that mass authentication is one of the desirable security features in the
edge computing paradigm, we propose a lightweight group authentication protocol with a …
edge computing paradigm, we propose a lightweight group authentication protocol with a …
Lightweight authentication scheme for healthcare with robustness to desynchronization attacks
Remote healthcare monitoring systems are gaining a lot of interest as they enable doctors to
use public channels to get real-time data from the sensors placed in/on the patient's body …
use public channels to get real-time data from the sensors placed in/on the patient's body …
Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud
The three-tier IoT–Edge–Cloud paradigm enables low-end devices to use the computation
capabilities of the more powerful edge nodes to meet efficiency constraints for real-time …
capabilities of the more powerful edge nodes to meet efficiency constraints for real-time …
A lightweight group-based SDN-driven encryption protocol for smart home IoT devices
With the increasing adoption rate of Internet of Things (IoT) devices in smart home
applications, it is vital to safeguard the privacy and security of information, communications …
applications, it is vital to safeguard the privacy and security of information, communications …
Skafs: Symmetric key authentication protocol with forward secrecy for edge computing
M Seifelnasr, R AlTawy… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The IoT-edge-cloud paradigm enables resource-constrained IoT devices to offload their
computation, thereby meeting the required quality-of-service for real-time applications …
computation, thereby meeting the required quality-of-service for real-time applications …
Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing
Q Zhu, L You, G Hu, S Wang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Currently, the biometric-based authentication schemes have been widely deployed in the
mobile edge computing environment to ensure the authenticity of the edge nodes' identities …
mobile edge computing environment to ensure the authenticity of the edge nodes' identities …
Generative Adversarial Privacy for Multimedia Analytics Across the IoT-Edge Continuum
The proliferation of multimedia-enabled IoT devices and edge computing enables a new
class of data-intensive applications. However, analyzing the massive volumes of multimedia …
class of data-intensive applications. However, analyzing the massive volumes of multimedia …
Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs
With the proliferation of edge-computing (EC), Internet-of-things (IoT), and smart
applications, many challenging security scenarios arise. For example, a common scenario in …
applications, many challenging security scenarios arise. For example, a common scenario in …
An Elliptic Curve Menezes–Qu–Vanston‐Based Authentication and Encryption Protocol for IoT
S Chanda, AK Luhach, JSA Francis… - Wireless …, 2024 - Wiley Online Library
The exponential growth of the Internet of Things (IoT) has led to a surge in data generation,
critical for business decisions. Ensuring data authenticity and integrity over unsecured …
critical for business decisions. Ensuring data authenticity and integrity over unsecured …