A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

Recent security trends in internet of things: A comprehensive survey

Y Harbi, Z Aliouat, A Refoufi, S Harous - IEEE Access, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) aims to transform everyday physical objects into an
interconnected ecosystem with digital data accessible anywhere and anytime.“Things” in IoT …

A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain

Q Fan, J Chen, LJ Deborah, M Luo - Journal of Systems Architecture, 2021 - Elsevier
Abstract Internet of Things (IoT) is a network convergence of multiple intelligent devices and
advanced technologies aiming at connecting and exchanging data over the Internet. IoT is …

FC-SEEDA: Fog computing-based secure and energy efficient data aggregation scheme for Internet of healthcare Things

C Chakraborty, SB Othman, FA Almalki… - Neural Computing and …, 2024 - Springer
IoT is used in healthcare to monitor patients via wearable sensors to measure different
physiological information. This collected information can be stored, processed, and made …

An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks

F Mezrag, S Bitam, A Mellouk - Journal of Network and Computer …, 2022 - Elsevier
Abstract Clustered Wireless Sensor Networks (CWSNs) are typically deployed in unsecured
or even hostile areas, making them vulnerable to many cyber-attacks and security threats …

Efficient configuration for multi-objective QoS optimization in wireless sensor network

N Mazloomi, M Gholipour, A Zaretalab - Ad Hoc Networks, 2022 - Elsevier
Wireless sensor network (WSN) is a self-organizing network consisting of many sensor
nodes situated in the monitoring area. One of the most important challenges of WSNs is to …

Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions

VR Kebande, AI Awad - ACM Computing Surveys, 2024 - dl.acm.org
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …

Intelligent data management and security in cloud computing

L Ogiela, MR Ogiela, H Ko - Sensors, 2020 - mdpi.com
This paper will present the authors' own techniques of secret data management and
protection, with particular attention paid to techniques securing data services. Among the …

An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing

U Chatterjee, S Ray, MK Khan, M Dasgupta, CM Chen - Computing, 2022 - Springer
Fog computing is a computing structure which is distributed in nature. Low latency,
reasonably low communication overhead and ability to support real time applications are the …

Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments

CT Chen, CC Lee, IC Lin - Plos one, 2020 - journals.plos.org
In the Internet of Things (IoT), numerous devices can interact with each other over the
Internet. A wide range of IoT applications have already been deployed, such as …