A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
Current research on Internet of Things (IoT) security: A survey
WH Hassan - Computer networks, 2019 - Elsevier
The results of IoT failures can be severe, therefore, the study and research in security issues
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …
Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
Designing blockchain-based access control protocol in IoT-enabled smart-grid system
We design a new blockchain-based access control protocol in IoT-enabled smart-grid
system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely …
system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely …
Security and privacy issues in smart cities/industries: technologies, applications, and challenges
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …
lives. Advanced information and communication technologies play a vital role in the …
Role of machine learning and deep learning in securing 5G-driven industrial IoT applications
Abstract The Internet of Things (IoT) connects millions of computing devices and has set a
stage for future technology where industrial use cases like smart cities and smart houses will …
stage for future technology where industrial use cases like smart cities and smart houses will …
Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment
The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
Design of secure user authenticated key management protocol for generic IoT networks
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …
applications including smart home, smart city, smart grid, industrial Internet, connected …