Internet of Things (IoT) networks: A systematic review and security assessment of authentication schemes
JS Yalli, MH Hasan, LT Jung, SM Al-Selwi - Internet of Things, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are revolutionizing various aspects of our lives by
enabling intelligent and automated systems. However, the proliferation of IoT devices also …
enabling intelligent and automated systems. However, the proliferation of IoT devices also …
A secure, lightweight, and anonymous user authentication protocol for IoT environments
The Internet of Things (IoT) is being applied to various environments such as telecare
systems, smart homes, and intelligent transportation systems. The information generated …
systems, smart homes, and intelligent transportation systems. The information generated …
A secure biometric-based authentication protocol for global mobility networks in smart cities
Smart city is an important concept in urban development. The use of information and
communication technology to promote quality of life and the management of natural …
communication technology to promote quality of life and the management of natural …
New features of authentication scheme for the IoT: a survey
T Yang, GH Zhang, L Liu, YY Yang, SR Zhao… - Proceedings of the 2nd …, 2019 - dl.acm.org
With the development of cloud computing and artificial intelligence, the Internet of Things
(IoT) products are gradually entering every corner of our lives and changing the way we live …
(IoT) products are gradually entering every corner of our lives and changing the way we live …
Enhancing transaction security for handling accountability in electronic health records
C Techapanupreed, W Kurutach - Security and Communication …, 2020 - Wiley Online Library
Electronic healthcare systems have received extensive attention during the last decade due
to the advancement of digital technology. Using these systems in the healthcare industry can …
to the advancement of digital technology. Using these systems in the healthcare industry can …
A Lightweight Symmetric Cryptography based User Authentication Protocol for IoT based Applications
M Reddy, K Rao - Scalable Computing: Practice and Experience, 2024 - scpe.org
The utilization of IoT is expanding across various domains, including telecare, intelligent
home systems, and transportation networks. In these environments, IoT devices generate …
home systems, and transportation networks. In these environments, IoT devices generate …
A Systematic Revirew and Security Assessment within the Context of Authentication for Internet of Things (Iot) Devices
J Yalli - Available at SSRN 4683897 - papers.ssrn.com
Internet of Things (IOT) device capabilities brings intelligence and adds automation to
several areas of the human life. This ability by the IOT devices offers a plethora of …
several areas of the human life. This ability by the IOT devices offers a plethora of …
A survey on IoT authentication security service: Open issues, security threats, and future solution direction
Internet of things is becoming the most important technology now a days and it is next era of
communication. By the use of IOT, various physical things can create, send and receive the …
communication. By the use of IOT, various physical things can create, send and receive the …
[PDF][PDF] Internet of Things
JS Yalli, MH Hasan, LT Jung, SM Al-Selwi - researchgate.net
ABSTRACT Internet of Things (IoT) networks are revolutionizing various aspects of our lives
by enabling intelligent and automated systems. However, the proliferation of IoT devices …
by enabling intelligent and automated systems. However, the proliferation of IoT devices …