Biometrics for internet-of-things security: A review

W Yang, S Wang, NM Sahri, NM Karie, M Ahmed… - Sensors, 2021 - mdpi.com
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …

Government regulations in cyber security: Framework, standards and recommendations

J Srinivas, AK Das, N Kumar - Future generation computer systems, 2019 - Elsevier
Cyber security refers to the protection of Internet-connected systems, such as hardware,
software as well as data (information) from cyber attacks (adversaries). A cyber security …

Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures

D He, S Zeadally, N Kumar… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Rapid advances in wireless communication technologies have paved the way for a wide
range of mobile devices to become increasingly ubiquitous and popular. Mobile devices …

Efficient privacy-aware authentication scheme for mobile cloud computing services

D He, N Kumar, MK Khan, L Wang… - IEEE Systems …, 2016 - ieeexplore.ieee.org
With the exponential increase of the mobile devices and the fast development of cloud
computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …

Design of a provably secure biometrics-based multi-cloud-server authentication scheme

S Kumari, X Li, F Wu, AK Das, KKR Choo… - Future Generation …, 2017 - Elsevier
Abstract Big Data and Cloud of Things (CoT) are two inter-related research trends in our
data-driven society, and one research challenge is to design efficient security solution that …

EASBF: An efficient authentication scheme over blockchain for fog computing-enabled internet of vehicles

MS Eddine, MA Ferrag, O Friha, L Maglaras - Journal of Information Security …, 2021 - Elsevier
The concept of the Internet of Vehicles (IoV) has attracted the attention of many sectors such
as the automotive industry, academia, engineering, etc., offering a wide variety of benefits …

PALK: Password-based anonymous lightweight key agreement framework for smart grid

AA Khan, V Kumar, M Ahmad, S Rana… - International Journal of …, 2020 - Elsevier
Smart grid (SG) is a highly efficient and more reliable framework that controls the computer,
automation, new technologies and equipment. In SG, electricity utilization and …

Understanding security failures of multi-factor authentication schemes for multi-server environments

D Wang, X Zhang, Z Zhang, P Wang - Computers & Security, 2020 - Elsevier
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …

ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things

S Majumder, S Ray, D Sadhukhan, MK Khan… - Wireless Personal …, 2021 - Springer
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …

[HTML][HTML] A three-factor anonymous user authentication scheme for Internet of Things environments

H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee - Journal of Information …, 2020 - Elsevier
To accelerate the deployment of fifth-generation (5G) cellular networks, millions of devices
are being connected to massive Internet of Things (IoT) networks. However, advances in the …