Key agreement and authentication protocols in the Internet of Things: A survey

S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …

REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things

M Tanveer, A Alkhayyat, N Kumar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the widespread utilization of Internet-enabled smart devices (SDs), the Industrial
Internet of Things (IIoT) has become prevalent in recent years. SDs exchange information …

Security and privacy risks in drone-based last mile delivery

YJ Tu, S Piramuthu - European Journal of Information Systems, 2023 - Taylor & Francis
The consideration of drones for last mile delivery brings with it several challenges that
include both physical ones such as battery life, drone range, carrying capacity, and form …

CKMIB: Construction of key agreement protocol for cloud medical infrastructure using blockchain

S Itoo, AA Khan, V Kumar, A Alkhayyat, M Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
In the traditional medical healthcare system, each medical facility is responsible for
preserving its own records. Sharing such records with another medical establishment is …

CADF-CSE: Chaotic map-based authenticated data access/sharing framework for IoT-enabled cloud storage environment

M Tanveer, AK Bashir, BA Alzahrani, A Albeshri… - Physical …, 2023 - Elsevier
Data is an essential asset of an organization or individual in this information age. Secure
and resource-efficient data communication has become paramount in the IoT-enabled cloud …

A new anonymous authentication framework for secure smart grids applications

M Tanveer, M Ahmad, HS Khalifa, A Alkhayyat… - Journal of Information …, 2022 - Elsevier
This paper proffers a secure and anonymous authenticated key exchange (AKE) scheme for
SGs, called SAAS-SG, for establishing a secure communication channel between smart …

PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones

M Sharma, B Narwal, R Anand, AK Mohapatra… - Computers and …, 2023 - Elsevier
Abstract Internet of Drones (IoD) is a thriving technology that has found its application in
various fields ranging from civilian to military and industries, empowering users to efficiently …

Resource-efficient authenticated data sharing mechanism for smart wearable systems

M Tanveer, M Ahmad, TN Nguyen… - … on Network Science …, 2022 - ieeexplore.ieee.org
Recent technological developments in the wearable devices (WDs) and smartphones
enabled ubiquitous and always-on monitoring of the users' movements. WDs collect the …

PSEBVC: Provably secure ECC and biometric based authentication framework using smartphone for vehicular cloud environment

V Kumar, AMA Al-Tameemi, A Kumari, M Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
The Vehicular Cloud Environment (VCE) is a brand-new study field in cloud and vehicular
network. It gives cars networking and sensor capabilities for V2I or V2V communication with …

Anonymous blockchain-assisted authentication protocols for secure cross-domain IoD communications

A Shahidinejad, J Abawajy - IEEE Transactions on Network …, 2023 - ieeexplore.ieee.org
Due to its diverse and promising use cases, including civilian, military, and commercial, the
Internet of Drones (IoD) has quickly become a hot issue in academic and industry circles …