A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
Recent security trends in internet of things: A comprehensive survey
The Internet of Things (IoT) aims to transform everyday physical objects into an
interconnected ecosystem with digital data accessible anywhere and anytime.“Things” in IoT …
interconnected ecosystem with digital data accessible anywhere and anytime.“Things” in IoT …
A secure and efficient authentication and data sharing scheme for Internet of Things based on blockchain
Abstract Internet of Things (IoT) is a network convergence of multiple intelligent devices and
advanced technologies aiming at connecting and exchanging data over the Internet. IoT is …
advanced technologies aiming at connecting and exchanging data over the Internet. IoT is …
FC-SEEDA: Fog computing-based secure and energy efficient data aggregation scheme for Internet of healthcare Things
IoT is used in healthcare to monitor patients via wearable sensors to measure different
physiological information. This collected information can be stored, processed, and made …
physiological information. This collected information can be stored, processed, and made …
An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks
Abstract Clustered Wireless Sensor Networks (CWSNs) are typically deployed in unsecured
or even hostile areas, making them vulnerable to many cyber-attacks and security threats …
or even hostile areas, making them vulnerable to many cyber-attacks and security threats …
Efficient configuration for multi-objective QoS optimization in wireless sensor network
Wireless sensor network (WSN) is a self-organizing network consisting of many sensor
nodes situated in the monitoring area. One of the most important challenges of WSNs is to …
nodes situated in the monitoring area. One of the most important challenges of WSNs is to …
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions
VR Kebande, AI Awad - ACM Computing Surveys, 2024 - dl.acm.org
The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0
revolution, which is projected to continue accelerating and realizing digital transformations …
revolution, which is projected to continue accelerating and realizing digital transformations …
Intelligent data management and security in cloud computing
This paper will present the authors' own techniques of secret data management and
protection, with particular attention paid to techniques securing data services. Among the …
protection, with particular attention paid to techniques securing data services. Among the …
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing
Fog computing is a computing structure which is distributed in nature. Low latency,
reasonably low communication overhead and ability to support real time applications are the …
reasonably low communication overhead and ability to support real time applications are the …
Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments
CT Chen, CC Lee, IC Lin - Plos one, 2020 - journals.plos.org
In the Internet of Things (IoT), numerous devices can interact with each other over the
Internet. A wide range of IoT applications have already been deployed, such as …
Internet. A wide range of IoT applications have already been deployed, such as …