Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

[HTML][HTML] Insights into Internet of Medical Things (IoMT): Data fusion, security issues and potential solutions

SF Ahmed, MSB Alam, S Afrin, SJ Rafa, N Rafa… - Information …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) has created a wide range of opportunities for
knowledge exchange in numerous industries. The opportunities include patient …

BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities

MO Ahmad, G Tripathi, F Siddiqui, MA Alam, MA Ahad… - Sensors, 2023 - mdpi.com
The overwhelming popularity of technology-based solutions and innovations to address day-
to-day processes has significantly contributed to the emergence of smart cities. where …

Secure biometric authentication with de-duplication on distributed cloud storage

K Venkatachalam, P Prabu, A Almutairi… - PeerJ Computer …, 2021 - peerj.com
Cloud computing is one of the evolving fields of technology, which allows storage, access of
data, programs, and their execution over the internet with offering a variety of information …

A comparative analysis on blockchain versus centralized authentication architectures for IoT-enabled smart devices in smart cities: a comprehensive review, recent …

U Khalil, OA Malik, M Uddin, CL Chen - Sensors, 2022 - mdpi.com
Smart devices have become an essential part of the architectures such as the Internet of
Things (IoT), Cyber-Physical Systems (CPSs), and Internet of Everything (IoE). In contrast …

A systematic survey of multi-factor authentication for cloud infrastructure

SP Otta, S Panda, M Gupta, C Hota - Future Internet, 2023 - mdpi.com
The unauthorized usage of various services and resources in cloud computing is something
that must be protected against. Authentication and access control are the most significant …

Authentication of IoT device and IoT server using security key

W Alnahari, MT Quasim - 2021 International Congress of …, 2021 - ieeexplore.ieee.org
IoT is an emerging topic in the field of IT that has attracted the interest of researchers from
different parts of the world. Authentication of IoT includes the establishment of a model for …

Survey: Self-Empowered Wireless Sensor Networks Security Taxonomy, Challenges, and Future Research Directions

M Adil, VG Menon, V Balasubramanian… - IEEE Sensors …, 2022 - ieeexplore.ieee.org
In the recent past, patient-wearable devices and implantable biosensors revealed
exponential growth in digital healthcare, because they have the capability to allow access to …

A hybrid dynamic encryption scheme for multi-factor verification: a novel paradigm for remote authentication

M Obaidat, J Brown, S Obeidat, M Rawashdeh - Sensors, 2020 - mdpi.com
A significant percentage of security research that is conducted suffers from common issues
that prevent wide-scale adoption. Common snags of such proposed methods tend to include …

Exploring half-duplex communication of NFC read/write mode for secure multi-factor authentication

MS Chishti, CT King, A Banerjee - IEEE Access, 2021 - ieeexplore.ieee.org
Near Field Communication (NFC) is a prominent short-range, contact-less communication
technology, which is rapidly getting popular in modern smart devices. For communication …