Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects

AR Javed, F Shahzad, S ur Rehman, YB Zikria… - Cities, 2022 - Elsevier
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …

A Bibliometrics Analysis of Medical Internet of Things for Modern Healthcare

HS Nguyen, HC Danh, QP Ma, J Mesicek, J Hajnys… - Electronics, 2023 - mdpi.com
The integration of the Internet of Things (IoT) in healthcare has been a popular topic in
recent years. This article provides a comprehensive review of the medical IoT for healthcare …

[PDF][PDF] Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.

JR Arunkumar, S Velmurugan… - … Systems Science & …, 2023 - cdn.techscience.cn
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of
applications and greatly attractive benefits, for example, self-governing, low expenditure on …

A systematic review on demand response role toward sustainable energy in the smart grids-adopted buildings sector

AM Al-Ghaili, ZAB Ibrahim, AA Bakar, H Kasim… - IEEE …, 2023 - ieeexplore.ieee.org
In the so near future, climate change caused by Carbon dioxide (CO 2) emissions as a result
of an increase in energy demand (ED) in the buildings sector becomes really hazard to our …

[HTML][HTML] ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor

SJ Yu, KS Park - Journal of Systems Architecture, 2022 - Elsevier
Smart grid (SG) has been received significant attention due to various services such as
renewable energy and demand response. However, SG is fragile to various security attacks …

Physically secure and conditional-privacy authenticated key agreement for VANETs

Y Liang, E Luo, Y Liu - IEEE Transactions on Vehicular …, 2023 - ieeexplore.ieee.org
To avoid physically extracting secrets from the storage of devices, Physical Unclonable
Function (PUF) is used in various authentication schemes. In these schemes, after the …

[HTML][HTML] Privacy-preserving authentication scheme based on zero trust architecture

F Tang, C Ma, K Cheng - Digital Communications and Networks, 2024 - Elsevier
Zero trust architecture is an end-to-end approach for server resources and data security
which contains identity authentication, access control, dynamic evaluation, and so on. This …

A security enhanced chaotic-map based authentication protocol for internet of drones

K Mahmood, Z Ghaffar, M Farooq… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling
them to participate in a connected network. In IoD infrastructure, drones communicate not …

A secure and privacy-preserving lightweight authentication and key exchange algorithm for smart agriculture monitoring system

S Itoo, AA Khan, M Ahmad, MJ Idrisi - IEEE Access, 2023 - ieeexplore.ieee.org
Agriculture plays a vital role in the economic life cycle of an agrarian country and considers
the backbone of the economy. It supplies not just raw food materials, but also a vast number …

Secure consumer-centric demand response management in resilient smart grid as industry 5.0 application with blockchain-based authentication

MF Ayub, X Li, K Mahmood… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The development of the industrial Internet of Things and smart grid networks has
emphasized the importance of secure smart grid communication for the future of electric …