An SDN perspective IoT-Fog security: A survey

S Javanmardi, M Shojafar, R Mohammadi, M Alazab… - Computer Networks, 2023 - Elsevier
The utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a
notion that solves cloud computing's limitations by offering low latency to IoT network user …

A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks

JY Lee, J Oh, Y Park - Electronics, 2023 - mdpi.com
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have
enabled medical professionals to identify patients' health information in real time to identify …

Enabling privacy-preserving multi-server collaborative search in smart healthcare

C Zhang, X Luo, Q Fan, T Wu, L Zhu - Future Generation Computer Systems, 2023 - Elsevier
With the advancement of smart healthcare, each medical institution stores huge amounts of
users' medical data in its cloud server for diagnosis and treatment. However, the traditional …

Modified lightweight cryptography scheme and its applications in IoT environment

N Yasmin, R Gupta - International Journal of Information Technology, 2023 - Springer
Interconnected devices have been with us for a long time. The security of the data
exchanged through these devices is a matter of grave concern. While exchanging …

Blockchain-Enabled Key Aggregate Searchable Encryption Scheme for Personal Health Record Sharing With Multi-Delegation

JY Lee, J Oh, DK Kwon, M Kim, K Kim… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The transition from patient-centered medical services to Health 5.0, which provides medical
services to all customers using smart healthcare, has led to the use of the Internet of Things …

A secure personal health record sharing system with key aggregate dynamic searchable encryption

J Oh, JY Lee, MH Kim, Y Park, KS Park, SK Noh - Electronics, 2022 - mdpi.com
Recently, as interest in individualized health has increased, the Personal Health Record
(PHR) has attracted a lot of attention for prognosis predictions and accurate diagnoses …

A Lightweight Seamless Authentication Scheme for Edge-Assisted IoV networks

S Son, M Kim, Y Park - 2023 Fourteenth International …, 2023 - ieeexplore.ieee.org
Internet of vehicles (IoV) is an expanded concept of vehicular ad-hoc networks (VANET),
and it is more scalable and can be combined with the latest mobile communication …

KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse

C Lan, H Li, C Wang, X Yang, H Yao - Computer Standards & Interfaces, 2024 - Elsevier
Abstract Key-Aggregate Searchable (KASE) can enable a data owner to delegate search
rights over a set of data files to multiple users through a single aggregated authorization key …

Optimizing Industrial IoT Data Security through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing

MN Sohail, A Anjum, IA Saeed, MH Syed… - IEEE …, 2024 - ieeexplore.ieee.org
Connecting smart industrial components to computer networks revolutionizes business
operations. However, in the Industrial Internet of Things (IIoT), the sharing of data has …

Secure Computing for Fog-Enabled Industrial IoT

AN Alvi, B Ali, MS Saleh, M Alkhathami, D Alsadie… - Sensors, 2024 - mdpi.com
Smart cities are powered by several new technologies to enhance connectivity between
devices and develop a network of connected objects which can lead to many smart …