Rotating behind privacy: An improved lightweight authentication scheme for cloud-based IoT environment

SA Chaudhry, A Irshad, K Yahya, N Kumar… - ACM Transactions on …, 2021 - dl.acm.org
The advancements in the internet of things (IoT) require specialized security protocols to
provide unbreakable security along with computation and communication efficiencies …

Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics

M Mahbub - Journal of Network and Computer Applications, 2020 - Elsevier
The IoT is the upcoming one of the major networking technologies. Using the IoT, different
items or devices can be allowed to continuously generate, obtain, and exchange …

Differential privacy for IoT-enabled critical infrastructure: A comprehensive survey

MA Husnoo, A Anwar, RK Chakrabortty, R Doss… - IEEE …, 2021 - ieeexplore.ieee.org
The rapid evolution of the Internet of Things (IoT) paradigm during the last decade has lead
to its adoption in critical infrastructure. However, the multitude of benefits that are derived …

Key technologies and challenges in IoT edge computing

S Naveen, MR Kounte - … conference on I-SMAC (IoT in social …, 2019 - ieeexplore.ieee.org
In recent years, the tremendous growth of interconnected devices results in a new
technology called Internet of Things (IoT). Cloud computing assists the IoT applications to …

Fine-grained data access control with attribute-hiding policy for cloud-based IoT

J Hao, C Huang, J Ni, H Rong, M Xian, XS Shen - Computer Networks, 2019 - Elsevier
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach to achieve
fine-grained access control over the outsourced data in Internet of Things (IoT). However, in …

Choice of application layer protocols for next generation video surveillance using internet of video things

T Sultana, KA Wahid - IEEE Access, 2019 - ieeexplore.ieee.org
Video surveillance has become ubiquitous due to the increasing security requirements in
every sphere of life. The next generation video surveillance system (VSS) possesses great …

Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures

S Jain, S Gupta, KK Sreelakshmi, JJPC Rodrigues - Cluster Computing, 2022 - Springer
The usage of 5G-enabled IoT devices is rising exponentially as humans tend to shift towards
a more automated lifestyle. A significant amount of IoT devices is expected to join the …

Lightweight privacy-preserving medical diagnosis in edge computing

Z Ma, J Ma, Y Miao, X Liu, KKR Choo… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the development of machine learning, it is popular that mobile users can submit
individual symptoms at any time anywhere for medical diagnosis. Edge computing is …

Security issues in fog environment: a systematic literature review

J Kaur, A Agrawal, RA Khan - International Journal of Wireless Information …, 2020 - Springer
The potent concept of fog computing is currently attracting many researchers as it brings
cloud services closer to the end-user. It also roots out some of the major limitations of the …

A two-way trust management system for fog computing

E Alemneh, SM Senouci, P Brunet… - Future Generation …, 2020 - Elsevier
Fog computing is the next frontier of cloud computing since it can compute and store a
massive amount of data generated by IoT devices near their sources. Indeed, transmitting all …