A comprehensive survey on machine learning-based big data analytics for IoT-enabled smart healthcare system

W Li, Y Chai, F Khan, SRU Jan, S Verma… - Mobile networks and …, 2021 - Springer
The outbreak of chronic diseases such as COVID-19 has made a renewed call for providing
urgent healthcare facilities to the citizens across the globe. The recent pandemic exposes …

Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions

MA Jan, J Cai, XC Gao, F Khan, S Mastorakis… - Journal of Network and …, 2021 - Elsevier
Abstract The Internet of Multimedia Things (IoMT) orchestration enables the integration of
systems, software, cloud, and smart sensors into a single platform. The IoMT deals with …

A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) is the ability to provide everyday devices with a way of
identification and another way for communication with each other. The spectrum of IoT …

Securing the internet of things in the age of machine learning and software-defined networking

F Restuccia, S D'oro, T Melodia - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) realizes a vision where billions of interconnected devices are
deployed just about everywhere, from inside our bodies to the most remote areas of the …

Security of internet of things based on cryptographic algorithms: a survey

SK Mousavi, A Ghaffari, S Besharat, H Afshari - Wireless Networks, 2021 - Springer
Abstract Internet of Things (IoT) is a new concept in Information and Communications
Technology and its structure is based on smart objects communications. It contributes to …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication

A Diro, H Reda, N Chilamkurti, A Mahmood… - IEEE …, 2020 - ieeexplore.ieee.org
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a
significant challenge for securing IoT applications. This necessitates a robust and …

Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

Security and key management in IoT‐based wireless sensor networks: An authentication protocol using symmetric key

A Ghani, K Mansoor, S Mehmood… - International Journal …, 2019 - Wiley Online Library
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense
various events in the surrounding environment and report back to the base station. Sensor …

Efficient quantum-based security protocols for information sharing and data protection in 5G networks

AA Abd EL-Latif, B Abd-El-Atty… - Future generation …, 2019 - Elsevier
Fifth generation (5G) networks aim at utilizing many promising communication technologies,
such as Cloud Computing, Network Slicing, and Software Defined Networking. Supporting a …