Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …
and communication advancements will empower better administration of accessible …
A Bibliometrics Analysis of Medical Internet of Things for Modern Healthcare
The integration of the Internet of Things (IoT) in healthcare has been a popular topic in
recent years. This article provides a comprehensive review of the medical IoT for healthcare …
recent years. This article provides a comprehensive review of the medical IoT for healthcare …
[PDF][PDF] Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.
JR Arunkumar, S Velmurugan… - … Systems Science & …, 2023 - cdn.techscience.cn
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of
applications and greatly attractive benefits, for example, self-governing, low expenditure on …
applications and greatly attractive benefits, for example, self-governing, low expenditure on …
A systematic review on demand response role toward sustainable energy in the smart grids-adopted buildings sector
AM Al-Ghaili, ZAB Ibrahim, AA Bakar, H Kasim… - IEEE …, 2023 - ieeexplore.ieee.org
In the so near future, climate change caused by Carbon dioxide (CO 2) emissions as a result
of an increase in energy demand (ED) in the buildings sector becomes really hazard to our …
of an increase in energy demand (ED) in the buildings sector becomes really hazard to our …
[HTML][HTML] ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor
Smart grid (SG) has been received significant attention due to various services such as
renewable energy and demand response. However, SG is fragile to various security attacks …
renewable energy and demand response. However, SG is fragile to various security attacks …
Physically secure and conditional-privacy authenticated key agreement for VANETs
To avoid physically extracting secrets from the storage of devices, Physical Unclonable
Function (PUF) is used in various authentication schemes. In these schemes, after the …
Function (PUF) is used in various authentication schemes. In these schemes, after the …
[HTML][HTML] Privacy-preserving authentication scheme based on zero trust architecture
F Tang, C Ma, K Cheng - Digital Communications and Networks, 2024 - Elsevier
Zero trust architecture is an end-to-end approach for server resources and data security
which contains identity authentication, access control, dynamic evaluation, and so on. This …
which contains identity authentication, access control, dynamic evaluation, and so on. This …
A security enhanced chaotic-map based authentication protocol for internet of drones
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling
them to participate in a connected network. In IoD infrastructure, drones communicate not …
them to participate in a connected network. In IoD infrastructure, drones communicate not …
A secure and privacy-preserving lightweight authentication and key exchange algorithm for smart agriculture monitoring system
Agriculture plays a vital role in the economic life cycle of an agrarian country and considers
the backbone of the economy. It supplies not just raw food materials, but also a vast number …
the backbone of the economy. It supplies not just raw food materials, but also a vast number …
Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication
The development of the industrial Internet of Things and smart grid networks has
emphasized the importance of secure smart grid communication for the future of electric …
emphasized the importance of secure smart grid communication for the future of electric …