Internet of things: Security and solutions survey

PK Sadhu, VP Yanambaka, A Abdelgawad - Sensors, 2022 - mdpi.com
The overwhelming acceptance and growing need for Internet of Things (IoT) products in
each aspect of everyday living is creating a promising prospect for the involvement of …

Application of IoT in healthcare: keys to implementation of the sustainable development goals

A Verdejo Espinosa, JL Lopez, F Mata Mata… - Sensors, 2021 - mdpi.com
We live in complex times in the health, social, political, and energy spheres, and we must be
aware of and implement new trends in intelligent social health systems powered by the …

RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones

M Tanveer, N Kumar, MM Hassan - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Practical and secure multifactor authentication protocol for autonomous vehicles in 5G

J Miao, Z Wang, X Ning, N Xiao… - Software: Practice and …, 2022 - Wiley Online Library
Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have
strategic significance for the development of the transportation industry. With the continuous …

CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

M Tanveer, A Badshah, H Alasmary, SA Chaudhry - Internet of Things, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) revolutionizes industrial production using
smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit …

Statistical analysis of remote health monitoring based IoT security models & deployments from a pragmatic perspective

K Ashok, S Gopikrishnan - IEEE Access, 2023 - ieeexplore.ieee.org
Remote health monitoring-based Internet of Things (IoT) network security is a multi-domain
task, that involves identification of network attack, evaluation of mitigation strategies, design …

Saaf-iod: Secure and anonymous authentication framework for the internet of drones

M Tanveer, H Alasmary, N Kumar… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Internet of Drones (IoD) offers several advantages, such as enabling ground
communications in areas with connectivity limitations due to physical obstacles. However …