Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022 - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …

RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones

M Tanveer, N Kumar, MM Hassan - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …

Session Key Agreement Protocol for Secure D2D Communication

VO Nyangaresi, Z Mohammad - … Conference on Safety and Security with …, 2022 - Springer
Device to device (D2D) communication offers numerous benefits such as low latencies, high
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …

A secure and anonymous user authentication scheme for IoT-enabled smart home environments using PUF

Y Cho, J Oh, D Kwon, S Son, J Lee, Y Park - IEEE Access, 2022 - ieeexplore.ieee.org
With the continuous development of Internet of Things (IoT) technology, research on smart
home environments is being conducted by many researchers. In smart home environments …

Hybrid cryptographic approach to enhance the mode of key management system in cloud environment

S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …

An improved lightweight user authentication scheme for the internet of medical things

K Kim, J Ryu, Y Lee, D Won - Sensors, 2023 - mdpi.com
The Internet of Medical Things (IoMT) is used in the medical ecosystem through medical IoT
sensors, such as blood glucose, heart rate, temperature, and pulse sensors. To maintain a …

Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks

YH Park, YH Park - Sensors, 2016 - mdpi.com
Secure communication is a significant issue in wireless sensor networks. User
authentication and key agreement are essential for providing a secure system, especially in …

[HTML][HTML] AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment

S Nashwan - Egyptian Informatics Journal, 2021 - Elsevier
The data capturing and access process is an important stage in the big data applications.
Most of these applications are exploited the wireless sensor networks (WSNs) to accomplish …

An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN

M Alotaibi - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are progressive ad hoc networks that comprise of
distributed sensors that are typically and randomly deployed over the target region. The …

A secure biometric-based authentication protocol for global mobility networks in smart cities

M Ghahramani, R Javidan, M Shojafar - The Journal of supercomputing, 2020 - Springer
Smart city is an important concept in urban development. The use of information and
communication technology to promote quality of life and the management of natural …