The internet of things security: A survey encompassing unexplored areas and new insights

AE Omolara, A Alabdulatif, OI Abiodun, M Alawida… - Computers & …, 2022 - Elsevier
The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of
life undertakings, mandates continuous research pursuits in IoT and its associated …

A review on the security of the internet of things: Challenges and solutions

OI Abiodun, EO Abiodun, M Alawida… - Wireless Personal …, 2021 - Springer
Abstract The Internet of Things (IoT) has emerged as a modern wave of Internet
technologies that promises great transformation of life in areas such as smart health, smart …

Design of secure protocol for cloud-assisted electronic health record system using blockchain

MH Kim, SJ Yu, JY Lee, YH Park, YH Park - Sensors, 2020 - mdpi.com
In the traditional electronic health record (EHR) management system, each medical service
center manages their own health records, respectively, which are difficult to share on the …

A secure charging system for electric vehicles based on blockchain

MH Kim, KS Park, SJ Yu, JY Lee, YH Park, SW Lee… - Sensors, 2019 - mdpi.com
Smart grids incorporating internet-of-things are emerging solutions to provide a reliable,
sustainable and efficient electricity supply, and electric vehicle drivers can access efficient …

[HTML][HTML] A three-factor anonymous user authentication scheme for Internet of Things environments

H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee - Journal of Information …, 2020 - Elsevier
To accelerate the deployment of fifth-generation (5G) cellular networks, millions of devices
are being connected to massive Internet of Things (IoT) networks. However, advances in the …

An improved lightweight user authentication scheme for the internet of medical things

K Kim, J Ryu, Y Lee, D Won - Sensors, 2023 - mdpi.com
The Internet of Medical Things (IoMT) is used in the medical ecosystem through medical IoT
sensors, such as blood glucose, heart rate, temperature, and pulse sensors. To maintain a …

A privacy preserving authentication scheme for roaming in IoT-based wireless mobile networks

BA Alzahrani, SA Chaudhry, A Barnawi, A Al-Barakati… - Symmetry, 2020 - mdpi.com
The roaming service enables a remote user to get desired services, while roaming in a
foreign network through the help of his home network. The authentication is a pre-requisite …

A secure and lightweight three-factor-based authentication scheme for smart healthcare systems

J Ryu, D Kang, H Lee, H Kim, D Won - Sensors, 2020 - mdpi.com
Internet of Things (IoT) technology has recently been integrated with various healthcare
devices to monitor patients' health status and share it with their healthcare practitioners …

Improved secure and efficient Chebyshev chaotic map-based user authentication scheme

J Ryu, D Kang, D Won - IEEE Access, 2022 - ieeexplore.ieee.org
A Chebyshev chaotic map is a method for implementing efficient authentication. Recently,
Chatterjee et al. proposed an authentication scheme for multi-server/multi-client …

Secure and efficient three-factor protocol for wireless sensor networks

J Ryu, H Lee, H Kim, D Won - Sensors, 2018 - mdpi.com
Wireless sensor networks are widely used in many applications such as environmental
monitoring, health care, smart grid and surveillance. Many security protocols have been …