A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …

[HTML][HTML] A user-centric privacy-preserving authentication protocol for IoT-AmI environments

M Masud, GS Gaba, P Kumar, A Gurtov - Computer Communications, 2022 - Elsevier
Abstract Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare
professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has …

Privacy protection for blockchain-based healthcare IoT systems: A survey

M Qi, Z Wang, QL Han, J Zhang… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
To enable precision medicine and remote patient monitoring, internet of healthcare things
(IoHT) has gained significant interest as a promising technique. With the widespread use of …

Securing cloud native applications using blockchain

P Mendki - 2021 12th International Conference on Information …, 2021 - ieeexplore.ieee.org
Cloud computing technologies have dominated more that a decade. Wider adoption of cloud
based processing has given rise to different architectural patterns. Cloud native applications …

[HTML][HTML] Continuous Entity Authentication in the Internet of Things Scenario

A De Santis, AL Ferrara, M Flores, B Masucci - Applied Sciences, 2023 - mdpi.com
In the context of the Internet of Things (IoT), the proliferation of identity spoofing threats has
led to the need for the constant entity verification of devices. Recently, a formal framework …