Proposing secure and lightweight authentication scheme for IoT based E-health applications

M Almulhim, N Zaman - 2018 20th International Conference on …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is the collection of connected smart devices\objects through
internet network. The rapid development of IoT and vast expansion of wireless technologies …

A new hierarchical architecture and protocol for key distribution in the context of IoT-based smart cities

O AbuAlghanam, M Qatawneh, W Almobaideen… - Journal of Information …, 2022 - Elsevier
Abstract The Internet of Things (IoT) is a system of objects such as traditional computers,
cameras, sensors and other things that are interconnected via a network to gather, process …

A lightweight authentication scheme for 5G mobile communications: a dynamic key approach

R Pothumarti, K Jain, P Krishnan - Journal of Ambient Intelligence and …, 2021 - Springer
The security of modern IoT Industry 4.0, 5G, 6G, Mobile ad hoc (MANET), narrowband
internet of things (NB-IoT) and wireless sensory (WSN) networks and the autonomous …

Enhancing IoT security: an innovative key management system for lightweight block ciphers

M Rana, Q Mamun, R Islam - Sensors, 2023 - mdpi.com
This research paper presents a study on designing and implementing a robust key
management scheme for lightweight block ciphers in Internet of Things (IoT) networks. Key …

LightCert: On designing a lighter certificate for resource‐limited Internet‐of‐Things devices

H Kwon, J Ahn, JG Ko - Transactions on emerging …, 2019 - Wiley Online Library
Abstract Internet‐of‐Things (IoT) devices are typically resource constrained in terms of
computing capabilities and battery power. Despite the efforts from the Internet Engineering …

Towards an efficient key management and authentication strategy for combined fog-to-cloud continuum systems

S Kahvazadeh, X Masip-Bruin, R Diaz… - … 3rd Cloudification of …, 2018 - ieeexplore.ieee.org
Fog-to-cloud systems have emerged as a novel concept intended to improve service
performance by considering fog and cloud resources in a coordinated way. In such a …

Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution

N Rattanavipanon, IO Nunes - arXiv preprint arXiv:2404.06721, 2024 - arxiv.org
The rise in IoT-driven distributed data analytics, coupled with increasing privacy concerns,
has led to a demand for effective privacy-preserving and federated data collection/model …

[PDF][PDF] IoT modes of operations with different security key management techniques: A survey

S Mohamed, AM Hassan, HK Aslan - Journal homepage: http …, 2021 - researchgate.net
Accepted: 2 December 2021 The internet of things (IoT) has provided a promising
opportunity to build powerful systems and applications. Security is the main concern in IoT …

A Key Management Scheme for Lightweight Block Cipher in Iot Networks

M Rana, Q Mamun, R Islam - Available at SSRN 4214062, 2022 - papers.ssrn.com
Secure communication is one of the significant concerns delaying the growth of the Internet
of Things (IoT). Key management is a challenging security issue because IoT devices have …

Innovation performance of listed companies based on machine computing and data envelopment analysis

X Song - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
The introduction and creation of new technological means can change and promote the
process and results of economic development, thus promoting the steady progress of …