Security and privacy issues in smart cities/industries: technologies, applications, and challenges

PM Rao, BD Deebak - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …

Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment

M Wazid, AK Das, V Bhat, AV Vasilakos - Journal of Network and Computer …, 2020 - Elsevier
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …

A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things

X Li, J Niu, MZA Bhuiyan, F Wu… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …

TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment

J Srinivas, AK Das, N Kumar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …

Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges

A Vangala, AK Das, V Chamola, V Korotaev… - Cluster …, 2023 - Springer
Agricultural industry is one of the most vital industries that has a major contribution to the
economy due to its share in the Gross Domestic Product (GDP) and as a source of …

A lightweight authentication and key agreement scheme for Internet of Drones

Y Zhang, D He, L Li, B Chen - Computer Communications, 2020 - Elsevier
Abstract Drones in Internet of Drones (IoD) can be able to reconnoiter environment, transport
the commodity with the help of embedded various sensors. They have been widely used in …

Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment

B Bera, A Vangala, AK Das, P Lorenz… - Computer Standards & …, 2022 - Elsevier
Abstract In an Intelligent Precision Agriculture (IPA), several Internet of Things (IoT) smart
devices and drones can be deployed to monitor an agricultural environment. The drones …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …