[HTML][HTML] Security and privacy issues of physical objects in the IoT: Challenges and opportunities

X Yao, F Farha, R Li, I Psychoula, L Chen… - Digital Communications …, 2021 - Elsevier
Abstract In the Internet of Things (IoT), security and privacy issues of physical objects are
crucial to the related applications. In order to clarify the complicated security and privacy …

Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview

P Nayak, G Swapna - Internet of Things, 2023 - Elsevier
Security is one of the major concerns in IoT networks which consists of a huge number of
objects that have given an alarm with the risen number of threats in our day-to-day life …

Multiple cloud storage mechanism based on blockchain in smart homes

Y Ren, Y Leng, J Qi, PK Sharma, J Wang… - Future Generation …, 2021 - Elsevier
The emergence of the smart home has fundamentally changed the quality of human living
owing to its usefulness and convenience. However, it still has some serious problems that …

Secure signature-based authenticated key establishment scheme for future IoT applications

S Challa, M Wazid, AK Das, N Kumar, AG Reddy… - Ieee …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet.
These devices can be remotely accessed and controlled using existing network …

Sybil attacks and their defenses in the internet of things

K Zhang, X Liang, R Lu, X Shen - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …

Certificateless remote anonymous authentication schemes for wirelessbody area networks

J Liu, Z Zhang, X Chen, KS Kwak - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Wireless body area network (WBAN) has been recognized as one of the promising wireless
sensor technologies for improving healthcare service, thanks to its capability of seamlessly …

An efficient merkle-tree-based authentication scheme for smart grid

H Li, R Lu, L Zhou, B Yang, X Shen - IEEE Systems Journal, 2013 - ieeexplore.ieee.org
Smart grid has emerged as the next generation of power grid, due to its reliability, flexibility,
and efficiency. However, smart grid faces some critical security challenges such as the …

A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges

X Cao, W Kou, X Du - Information Sciences, 2010 - Elsevier
Based on the computational Diffie–Hellman problem, this paper proposes an identity-based
authenticated key agreement protocol which removes bilinear pairings. Compared with …

Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks

H Xiong, Z Qin - IEEE transactions on information forensics and …, 2015 - ieeexplore.ieee.org
To ensure the security and privacy of the patient's health status in the wireless body area
networks (WBANs), it is critical to secure the extra-body communication between the smart …

Design and implementation of TARF: A trust-aware routing framework for WSNs

G Zhan, W Shi, J Deng - IEEE Transactions on dependable and …, 2011 - ieeexplore.ieee.org
The multihop routing in wireless sensor networks (WSNs) offers little protection against
identity deception through replaying routing information. An adversary can exploit this defect …