An improved certificateless mutual authentication and key agreement protocol for cloud-assisted wireless body area networks

P Verma, DS Gupta - Wireless Personal Communications, 2023 - Springer
This paper is based on the work published by Cheng et al. in the journal Mobile Networks
and Applications. Cheng et al. proposed a certificateless authentication and key agreement …

Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field

TM Okediran, OR Vincent, AA Abayomi-Alli… - The Journal of …, 2024 - Springer
The perceptual layer of the Internet of Things has some security threats, such as denial of
service, botnet, and falsification attacks. The existing security schemes are the symmetric …

Forward Secrecy Attack on Privacy Preserving Machine Authenticated Key Agreement for Internet of Things

BA Chiphiko, H Kim, P Ali… - Archives of Advanced …, 2023 - ojs.bonviewpress.com
Internet of things (IoT) is to connect billions of devices and machines via Internet and to have
a smart system. Sensors and devices in IoT environment are connected and communicated …

[PDF][PDF] MEKDA: multilevel ECC Based Key Distribution And Authentication In Internet of Things

MG Padmashree, JP Mallikarjun, JS Arunalatha… - 2021 - academia.edu
ABSTRACT The Internet of Things (IoT) is an extensive system of networks and connected
devices with minimal human interaction and swift growth. The constraints of the System and …

[PDF][PDF] Privacy preserving authenticated key agreement based on bilinear pairing for uHealthcare.

S Cho, H Kim - Int. Arab J. Inf. Technol., 2021 - iajit.org
With the growth of wireless communication technologies and sensor technologies,
ubiquitous Healthcare (uHealthcare) based on Internet of Things (IoT) is becoming a big …

[PDF][PDF] Securing The Perceptual Layer of the Internet of Things (IOT) Devices Using Elliptic Curve Cryptography

TM Okediran, OR Vincent, AA Abayomi-Alli… - 2023 - academia.edu
The security of IOT layers has become very important considering the various attacks faced
by IOT devices especially, the perceptual layer. Reported attacks in recent times include …

Change Identification and Notification Framework for IoT Enabled Smart Security System

J Arora, M Sethi, S Singh - 2022 10th International Conference …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) based smart home appliance control provides better and more
comfortable living. The home control system includes temperature control, lighting control …

Securing the Perceptual Layer of E-Payment-Based Internet of Things Devices Using Elliptic Curve Cryptography

TM Okediran, OR Vincent, AA Abayomi-Alli… - 2023 - researchsquare.com
The security of IoT layers has become paramount considering the various attacks facing IoT
devices, especially the perceptual layer. Reported attacks in recent times include direct …

[HTML][HTML] IJCNC-02

MTOMA KEY - ijcnc.com
Internet of things (IoT), is the interconnection via the Internet of computing devices
embedded in everyday objects, enabling them to send and receive data. The …

[HTML][HTML] IJCNC 02

MG Padmashree, JP Mallikarjun, JS Arunalatha… - ijcnc.com
ABSTRACT The Internet of Things (IoT) is an extensive system of networks and connected
devices with minimal human interaction and swift growth. The constraints of the System and …