A review on lightweight cryptography for Internet-of-Things based applications
Abstract The Internet-of-Things (IoT) is a combination of an intelligent infrastructure
combined with various self-organizing devices. These devices are used to monitor the …
combined with various self-organizing devices. These devices are used to monitor the …
Machine learning based novel approach for intrusion detection and prevention system: A tool based verification
PR Chandre, PN Mahalle… - 2018 IEEE global …, 2018 - ieeexplore.ieee.org
Now a day, Wireless Sensor Networks are widely used in military applications by its
applications, it is extended to healthcare, industrial environments and many more. As we …
applications, it is extended to healthcare, industrial environments and many more. As we …
An enhanced pairing-based authentication scheme for smart grid communications
To ensure that messages can be securely transmitted between different entities in a smart
grid, many researchers have focused on authentication and key exchange schemes. Chen …
grid, many researchers have focused on authentication and key exchange schemes. Chen …
Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems
With the tremendous growth of Information and Communications Technology (ICT), Cyber
Physical Systems (CPS) have opened the door for many potential applications ranging from …
Physical Systems (CPS) have opened the door for many potential applications ranging from …
SUSIC: A secure user access control mechanism for SDN-enabled IIoT and cyber–physical systems
The integration of thriving information and communications technology (ICT) and cyber–
physical systems (CPSs) has spawned several innovative applications, such as remote …
physical systems (CPSs) has spawned several innovative applications, such as remote …
A provable secure and efficient authentication framework for smart manufacturing industry
Smart manufacturing is transforming the manufacturing industry by enhancing productivity
and quality, driving growth in the global economy. The Internet of Things (IoT) has played a …
and quality, driving growth in the global economy. The Internet of Things (IoT) has played a …
Hash polynomial two factor decision tree using IoT for smart health care scheduling
The steady growth of an aging population and increased frequency of chronic disease led to
the development of Smart Health Care (SHC) systems. While patient prioritization is the core …
the development of Smart Health Care (SHC) systems. While patient prioritization is the core …
Light-weight hashing method for user authentication in Internet-of-Things
The goal of Internet-of-Things (IoT) is that every object across the globe be interconnected
under the Internet Infrastructure. IoT is expanding its application domain to range from …
under the Internet Infrastructure. IoT is expanding its application domain to range from …
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment
KAA Mutlaq, VO Nyangaresi, MA Omar… - … Conference on Applied …, 2022 - Springer
The traditional power grid systems are being replaced with smart grids so as to offer the
required levels of flexibility, reliability, efficiency and dynamic power adjustments. However …
required levels of flexibility, reliability, efficiency and dynamic power adjustments. However …
Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things
With the increasing popularity and wide application of the Internet, the users (such as
managers and data consumers) in the Industrial Internet of Things (IIoT) can remotely …
managers and data consumers) in the Industrial Internet of Things (IIoT) can remotely …