FPGA implementation of mutual authentication protocol for medication security system

WC Lin, PK Huang, CL Pan, YJ Huang - Journal of Low Power …, 2021 - mdpi.com
Medication safety administration is a complicated process involving the information of
patients, drugs, and data storage. The sensitive data transmitted through wireless sensor …

Fog-orchestrated and server-controlled anonymous group authentication and key agreement

P Shabisha, A Braeken, P Kumar, K Steenhaut - IEEE Access, 2019 - ieeexplore.ieee.org
Fog architectures are currently present in many applications. Constrained devices equipped
with sensors produce measurements that will be sent to a nearby gateway, called the fog …

Formal analysis of the continuous dynamics of cyber–physical systems using theorem proving

A Rashid, O Hasan - Journal of Systems Architecture, 2021 - Elsevier
Transform methods, such as the Laplace and the Fourier transforms, are widely used for
analyzing the continuous dynamics of the physical components of Cyber–physical Systems …

Real-time GPS Tracking System for IoT-Enabled Connected Vehicles

I Moumen, N Rafalia, J Abouchabaka… - E3S Web of …, 2023 - e3s-conferences.org
This paper presents a real-time GPS tracking solution for connected vehicle networks,
leveraging IoT, V2X communication, and VANET technologies. The system uses Arduino …

Linear optimization and fuzzy-based clustering for WSNs assisted internet of things

P Maratha, K Gupta - Multimedia Tools and Applications, 2023 - Springer
Wireless data transmission on the Internet of Things (IoT) needs data-aware communication
protocols. Clustering is one of the effective network management approaches that enhance …

Smart card-based identity management protocols for V2V and V2I communications in CCAM: a systematic literature review

S Berlato, M Centenaro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Besides developing new Cooperative, Connected and Automated Mobility (CCAM) services
for the improvement of road safety and travel experience, researchers are considering …

Network and security leveraging IoT and image processing: A quantum leap forward

AS Bale, SS Kumar, SV Yogi, S Vura, RB Chithra… - System …, 2022 - Elsevier
This chapter describes various solutions to meet the challenges of today's networks, which
are incapable of providing services to users due to high usage of data. Augmented reality …

Fog Computing paradigm for Internet of Things: Architectures, issues, challenges, and applications

U Verma, D Bhardwaj - Advances in Distributed Computing and Machine …, 2022 - Springer
The ability of current cloud model is insufficient to handle requirements of Internet of Things
(IoT). In cloud computing-based IoT model, IoT has unsupported features, eg, geographical …

[HTML][HTML] Improved Data Security in Cloud Environment for Test Automation Framework and Access Control for Industry 4.0

PK Tiwari, SK Pandey, W Thamba Meshach… - … and Mobile Computing, 2022 - hindawi.com
In analyzing project regressions, automation has emerged as a major agenda in managing
changes in software which requires minimum manual intervention. For rapid testing …

[PDF][PDF] Conditional Privacy-Preserving Authentication Scheme for IoV Based on ECC

PS Xie, XJ Pan, H Wang, JL Wang, T Feng… - Int. J. Netw …, 2022 - ijns.jalaxy.com.tw
Abstract Internet of Vehicles (IoVs) is an important part of intelligent transportation systems
that could improve the safety and efficiency of vehicle nodes. However, due to the mobility of …