A review on lightweight cryptography for Internet-of-Things based applications

V Rao, KV Prema - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Abstract The Internet-of-Things (IoT) is a combination of an intelligent infrastructure
combined with various self-organizing devices. These devices are used to monitor the …

Machine learning based novel approach for intrusion detection and prevention system: A tool based verification

PR Chandre, PN Mahalle… - 2018 IEEE global …, 2018 - ieeexplore.ieee.org
Now a day, Wireless Sensor Networks are widely used in military applications by its
applications, it is extended to healthcare, industrial environments and many more. As we …

An enhanced pairing-based authentication scheme for smart grid communications

TY Wu, YQ Lee, CM Chen, Y Tian… - Journal of Ambient …, 2021 - Springer
To ensure that messages can be securely transmitted between different entities in a smart
grid, many researchers have focused on authentication and key exchange schemes. Chen …

Authenticated key agreement scheme with user anonymity and untraceability for 5G-enabled softwarized industrial cyber-physical systems

AK Sutrala, MS Obaidat, S Saha, AK Das… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
With the tremendous growth of Information and Communications Technology (ICT), Cyber
Physical Systems (CPS) have opened the door for many potential applications ranging from …

SUSIC: A secure user access control mechanism for SDN-enabled IIoT and cyber–physical systems

A Irshad, GA Mallah, M Bilal… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The integration of thriving information and communications technology (ICT) and cyber–
physical systems (CPSs) has spawned several innovative applications, such as remote …

A provable secure and efficient authentication framework for smart manufacturing industry

M Hammad, A Badshah, G Abbas, H Alasmary… - IEEE …, 2023 - ieeexplore.ieee.org
Smart manufacturing is transforming the manufacturing industry by enhancing productivity
and quality, driving growth in the global economy. The Internet of Things (IoT) has played a …

Hash polynomial two factor decision tree using IoT for smart health care scheduling

R Manikandan, R Patan, AH Gandomi… - Expert Systems with …, 2020 - Elsevier
The steady growth of an aging population and increased frequency of chronic disease led to
the development of Smart Health Care (SHC) systems. While patient prioritization is the core …

Light-weight hashing method for user authentication in Internet-of-Things

V Rao, KV Prema - Ad Hoc Networks, 2019 - Elsevier
The goal of Internet-of-Things (IoT) is that every object across the globe be interconnected
under the Internet Infrastructure. IoT is expanding its application domain to range from …

Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment

KAA Mutlaq, VO Nyangaresi, MA Omar… - … Conference on Applied …, 2022 - Springer
The traditional power grid systems are being replaced with smart grids so as to offer the
required levels of flexibility, reliability, efficiency and dynamic power adjustments. However …

Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things

H Xu, C Hsu, L Harn, J Cui, Z Zhao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the increasing popularity and wide application of the Internet, the users (such as
managers and data consumers) in the Industrial Internet of Things (IIoT) can remotely …