Security and privacy issues in smart cities/industries: technologies, applications, and challenges
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …
lives. Advanced information and communication technologies play a vital role in the …
Machine learning–based cyber attacks targeting on controlled information: A survey
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …
information leakage incidents, has become an emerging cyber security threat in recent …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …
Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges
Agricultural industry is one of the most vital industries that has a major contribution to the
economy due to its share in the Gross Domestic Product (GDP) and as a source of …
economy due to its share in the Gross Domestic Product (GDP) and as a source of …
A lightweight authentication and key agreement scheme for Internet of Drones
Abstract Drones in Internet of Drones (IoD) can be able to reconnoiter environment, transport
the commodity with the help of embedded various sensors. They have been widely used in …
the commodity with the help of embedded various sensors. They have been widely used in …
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment
Abstract In an Intelligent Precision Agriculture (IPA), several Internet of Things (IoT) smart
devices and drones can be deployed to monitor an agricultural environment. The drones …
devices and drones can be deployed to monitor an agricultural environment. The drones …
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …