The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective

B Zolfaghari, A Yazdinejad, A Dehghantanha… - arXiv preprint arXiv …, 2022 - arxiv.org
In recent years, the existence of a significant cross-impact between Cloud computing and
Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT …

GASE: A lightweight group authentication scheme with key agreement for edge computing applications

M Nakkar, R AlTawy, A Youssef - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Motivated by the fact that mass authentication is one of the desirable security features in the
edge computing paradigm, we propose a lightweight group authentication protocol with a …

Lightweight authentication scheme for healthcare with robustness to desynchronization attacks

S Shihab, R AlTawy - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Remote healthcare monitoring systems are gaining a lot of interest as they enable doctors to
use public channels to get real-time data from the sensors placed in/on the patient's body …

Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud

M Seifelnasr, R AlTawy, A Youssef… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The three-tier IoT–Edge–Cloud paradigm enables low-end devices to use the computation
capabilities of the more powerful edge nodes to meet efficiency constraints for real-time …

A lightweight group-based SDN-driven encryption protocol for smart home IoT devices

A Raza, S Khan, S Shrivastava, MWA Ashraf, T Wang… - Computer Networks, 2024 - Elsevier
With the increasing adoption rate of Internet of Things (IoT) devices in smart home
applications, it is vital to safeguard the privacy and security of information, communications …

Skafs: Symmetric key authentication protocol with forward secrecy for edge computing

M Seifelnasr, R AlTawy… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The IoT-edge-cloud paradigm enables resource-constrained IoT devices to offload their
computation, thereby meeting the required quality-of-service for real-time applications …

Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing

Q Zhu, L You, G Hu, S Wang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Currently, the biometric-based authentication schemes have been widely deployed in the
mobile edge computing environment to ensure the authenticity of the edge nodes' identities …

Generative Adversarial Privacy for Multimedia Analytics Across the IoT-Edge Continuum

X Wang, J Lv, BG Kim, C Maple… - … on Cloud Computing, 2024 - ieeexplore.ieee.org
The proliferation of multimedia-enabled IoT devices and edge computing enables a new
class of data-intensive applications. However, analyzing the massive volumes of multimedia …

Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs

M Nakkar, R AlTawy, A Youssef - IEEE Transactions on Network …, 2024 - ieeexplore.ieee.org
With the proliferation of edge-computing (EC), Internet-of-things (IoT), and smart
applications, many challenging security scenarios arise. For example, a common scenario in …

An Elliptic Curve Menezes–Qu–Vanston‐Based Authentication and Encryption Protocol for IoT

S Chanda, AK Luhach, JSA Francis… - Wireless …, 2024 - Wiley Online Library
The exponential growth of the Internet of Things (IoT) has led to a surge in data generation,
critical for business decisions. Ensuring data authenticity and integrity over unsecured …