[HTML][HTML] The Internet of Things (IoT) in healthcare: Taking stock and moving forward

A Rejeb, K Rejeb, H Treiblmaier, A Appolloni… - Internet of Things, 2023 - Elsevier
Recent improvements in the Internet of Things (IoT) have allowed healthcare to evolve
rapidly. This article summarizes previous studies on IoT applications in healthcare. A …

Extending lifetime of Wireless Nano-Sensor Networks: An energy efficient distributed routing algorithm for Internet of Nano-Things

O Gulec - Future Generation Computer Systems, 2022 - Elsevier
Recent improvements in nanotechnology and Internet of Things (IoT) have led to the
emergence of the concept of Internet of Nano-Things (IoNT). This concept provided ease of …

[HTML][HTML] Security of Internet of Things (IoT) using federated learning and deep learning-Recent advancements, issues and prospects

V Gugueoth, S Safavat, S Shetty - ICT Express, 2023 - Elsevier
There is a great demand for an efficient security framework which can secure IoT systems
from potential adversarial attacks. However, it is challenging to design a suitable security …

Deepknuckle: Deep learning for finger knuckle print recognition

AS Tarawneh, AB Hassanat, E Alkafaween, B Sarayrah… - Electronics, 2022 - mdpi.com
Biometric technology has received a lot of attention in recent years. One of the most
prevalent biometric traits is the finger-knuckle print (FKP). Because the dorsal region of the …

Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends

A Khan, A Ahmad, M Ahmed, J Sessa… - Complex & Intelligent …, 2022 - Springer
Scalable and secure authorization of smart things is of the crucial essence for the successful
deployment of the Internet of Things (IoT). Unauthorized access to smart things could …

Secure multi-factor access control mechanism for pairing blockchains

AA Addobea, Q Li, IA Obiri Jr, J Hou - Journal of Information Security and …, 2023 - Elsevier
Digitalization has made it easier for centric systems to transition from single-factor to two-
factor authentication. However, several access control practices struggle to authenticate …

Seamless privacy-preservation and authentication framework for IoT-enabled smart eHealth systems

BD Deebak, FH Memon, X Cheng, K Dev, J Hu… - Sustainable Cities and …, 2022 - Elsevier
The initiatives of sustainable urbanization use ICT-based innovation to improve service
efficiencies of smart cities and to discover modern economic opportunities. The smart …

SAKE*: A symmetric authenticated key exchange protocol with perfect forward secrecy for industrial Internet of Things

Q Fan, J Chen, M Shojafar, S Kumari… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Security in the Industrial Internet of Things (IIoT) is vital as there are some cases where IIoT
devices collect sensory information for crucial social production and life. Thus, designing …

CS-LAKA: A lightweight authenticated key agreement protocol with critical security properties for IoT environments

Y Guo, Y Guo - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Anonymity, robust synchronization, and perfect forward secrecy are the most important
security properties of authenticated key agreement (AKA) protocols. Designing AKA …

Dynamic DNA cryptography-based image encryption scheme using multiple chaotic maps and SHA-256 hash function

B Rahul, K Kuppusamy, A Senthilrajan - Optik, 2023 - Elsevier
In today's world, a substantial number of digital images are conserved and transmitted
through diverse online platforms on a daily basis. Preserving the confidentiality of images is …