Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends

MA Ferrag, L Maglaras, A Derhab - Security and …, 2019 - Wiley Online Library
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the
purpose of this investigation is to summarise the factors that hinder biometrics models' …

Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks

VO Nyangaresi - Ad Hoc Networks, 2023 - Elsevier
Wireless body area networks have gained popularity due to their ability to enhance
efficiency, flexibility, convenience and the quality of life. In this environment, the patient …

Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

Authentication schemes for healthcare applications using wireless medical sensor networks: A survey

AN Bahache, N Chikouche, F Mezrag - SN Computer Science, 2022 - Springer
Many applications are developed with the quick emergence of the Internet of things (IoT)
and wireless sensor networks (WSNs) in the health sector. Healthcare applications that use …

Design of a secure three-factor authentication scheme for smart healthcare

K Renuka, S Kumari, X Li - Journal of medical systems, 2019 - Springer
Now-a-days, the society is witnessing a keen urge to enhance the quality of healthcare
services with the intervention of technology in the health sector. The main focus in …

Internet of things (IoT) design considerations for developers and manufacturers

B Javed, MW Iqbal, H Abbas - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
IoT (Internet of Things) is a network of interconnected devices, designed to collect and
exchange data which can then turn it into information, eventually into wisdom. IoT is a region …

SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement

R Hajian, S ZakeriKia, SH Erfani, M Mirabi - Computer Networks, 2020 - Elsevier
Security in wearable sensor networks and telecare medical information systems (TMIS) has
turned to an issue of scholarly interest in recent years. Adequate security to agree on a …

Efficient design of a novel ECC-based public key scheme for medical data protection by utilization of NanoPi fire

D Abbasinezhad-Mood… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Investigating the literature reveals the fact that the key management protocols play a vital
role in protecting the security and privacy of medical data in telecare medical information …

Two-factor mutual authentication offloading for mobile cloud computing

A Derhab, M Belaoued, M Guerroumi, FA Khan - IEEE Access, 2020 - ieeexplore.ieee.org
Security analysts have shown that it is possible to compromise the mobile two-factor
authentication applications that employ SMS-based authentication. In this paper, we …

A robust authentication scheme with dynamic password for wireless body area networks

X Liu, R Zhang, M Zhao - Computer Networks, 2019 - Elsevier
With the development of wireless technologies, wireless body area networks (WBANs) are
widely used in various applications. WBANs bring convenience to both patients and …