Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

Proposing a secure RPL based internet of things routing protocol: a review

ZA Almusaylim, A Alhumam, NZ Jhanjhi - Ad Hoc Networks, 2020 - Elsevier
Abstract Nowadays, the Internet of Things (IoT) research domain attracts the researchers,
due to its extensive collection of applications and ease in deploying in several domains of …

SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication

T Alladi, G Bansal, V Chamola… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are becoming very popular nowadays due to the
emergence of application areas such as the Internet of Drones (IoD). They are finding wide …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

Securing internet of medical things systems: Limitations, issues and recommendations

JPA Yaacoub, M Noura, HN Noura, O Salman… - Future Generation …, 2020 - Elsevier
Traditional health-care systems suffer from new challenges associated with the constant
increase in the number of patients. In order to address this issue, and to increase the …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks

Q Feng, D He, S Zeadally… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
If all vehicles are connected together through a wireless communication channel, vehicular
ad hoc networks (VANETs) can support a wide range of real-time traffic information services …

Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks

P Gope, AK Das, N Kumar… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …

Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment

B Bera, A Vangala, AK Das, P Lorenz… - Computer Standards & …, 2022 - Elsevier
Abstract In an Intelligent Precision Agriculture (IPA), several Internet of Things (IoT) smart
devices and drones can be deployed to monitor an agricultural environment. The drones …

Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0

D Xu, K Yu, JA Ritcey - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle
the challenges imposed by explosive real-time manufacturing data in the context of Internet …