An exhaustive survey on security and privacy issues in Healthcare 4.0

JJ Hathaliya, S Tanwar - Computer Communications, 2020 - Elsevier
The healthcare industry has revolutionized from 1.0 to 4.0 where Healthcare 1.0 was more
doctor centric and Healthcare 2.0 replaced manual records with electronic healthcare …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment

M Wazid, AK Das, V Bhat, AV Vasilakos - Journal of Network and Computer …, 2020 - Elsevier
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …

BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment

N Garg, M Wazid, AK Das, DP Singh… - IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) is a kind of connected infrastructure of smart medical
devices along with software applications, health systems and services. These medical …

Secure remote user authenticated key establishment protocol for smart home environment

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …

AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment

M Wazid, P Bagga, AK Das, S Shetty… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart
transportation that takes intelligent commitments to the passengers to improve traffic safety …

Cloud centric authentication for wearable healthcare monitoring system

J Srinivas, AK Das, N Kumar… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Security and privacy are the major concerns in cloud computing as users have limited
access on the stored data at the remote locations managed by different service providers …

State of the art: Secure mobile payment

W Liu, X Wang, W Peng - IEEE Access, 2020 - ieeexplore.ieee.org
With mobile payments popular around the world, payers can conduct a payment anytime
and anywhere. While providing great convenience, mobile payment also brings many …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment

AK Das, M Wazid, N Kumar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Due to the widespread popularity of Internet-enabled devices, Industrial Internet of Things
(IIoT) becomes popular in recent years. However, as the smart devices share the information …