Security and privacy issues in smart cities/industries: technologies, applications, and challenges

PM Rao, BD Deebak - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

Elliptic curve lightweight cryptography: A survey

CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …

ECC based inter-device authentication and authorization scheme using MQTT for IoT networks

A Lohachab - Journal of Information Security and Applications, 2019 - Elsevier
Abstract Internet of Things (IoT) has emerged from the proliferation of smart and inter-
connected devices ranging from tiny sensors to complex Fog and Cloud nodes, various …

Remotely access “my” smart home in private: An anti-tracking authentication and key agreement scheme

Q Lyu, N Zheng, H Liu, C Gao, S Chen, J Liu - IEEE Access, 2019 - ieeexplore.ieee.org
Smart home is one of the key applications of the Internet of Things (IoT), which allows users
to control the smart devices in their houses through the Internet. However, a smart home …

A Secure and Lightweight Three‐Factor Remote User Authentication Protocol for Future IoT Applications

BH Taher, H Liu, F Abedi, H Lu, AA Yassin… - Journal of …, 2021 - Wiley Online Library
With the booming integration of IoT technology in our daily life applications such as smart
industrial, smart city, smart home, smart grid, and healthcare, it is essential to ensure the …

An ECC-based access control scheme with lightweight decryption and conditional authentication for data sharing in vehicular networks

X Qin, Y Huang, X Li - Soft Computing, 2020 - Springer
Nowadays, more and more data are stored on cloud for sharing in vehicular networks, but
the increasing number of cloud data security incidents makes how to guarantee …

Iba: A secure and efficient device-to-device interaction-based authentication scheme for internet of things

S Yang, X Zheng, G Liu, X Wang - Computer Communications, 2023 - Elsevier
Abstract The Internet of Things (IoT) enables a variety of services through frequent
communication and interaction between devices, bringing a great deal of benefits to human …

New features of authentication scheme for the IoT: a survey

T Yang, GH Zhang, L Liu, YY Yang, SR Zhao… - Proceedings of the 2nd …, 2019 - dl.acm.org
With the development of cloud computing and artificial intelligence, the Internet of Things
(IoT) products are gradually entering every corner of our lives and changing the way we live …

Resource efficient authentication and session key establishment procedure for low-resource IoT devices

S Khan, AI Alzahrani, O Alfarraj, N Alalwan… - IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) can includes many resource-constrained devices, with most
usually needing to securely communicate with their network managers, which are more …