ECC based authentication scheme for smart homes

VO Nyangaresi - 2021 International Symposium ELMAR, 2021 - ieeexplore.ieee.org
Smart homes security has attracted a lot of attention from both the industry and academia,
leading to the development of numerous schemes for both key management and …

An overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on Smart home applications

AM Gamundani, A Phillips… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Internet of things (IoT) are finding their wide use in various domains. IoT implementation in
the Smart home domain is one that is complex as the devices that are being used in such …

Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions

R Chaudhary, GS Aujla, N Kumar… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Due to its widespread popularity and usage in many applications (smart transport, energy
management, e-healthcare, smart ecosystem, and so on), the Internet of Things (IoT) has …

Securing IoT-based smart healthcare systems by using advanced lightweight privacy-preserving authentication scheme

S Das, S Namasudra, S Deb, PM Ger… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In the healthcare network, the Internet of Things (IoT) devices are connected to the network
for enabling remote monitoring of patients' health. IoT Device (IoTD) security, however, is a …

Robust and lightweight mutual authentication scheme in distributed smart environments

GS Gaba, G Kumar, H Monga, TH Kim, P Kumar - IEEE Access, 2020 - ieeexplore.ieee.org
In the smart environments several smart devices are continuously working together to make
individuals' lives more comfortable. Few of the examples are smart homes, smart buildings …

Towards a secure and computational framework for internet of drones enabled aerial computing

M Tanveer, TN Nguyen, M Ahmad… - … on Network Science …, 2022 - ieeexplore.ieee.org
In Internet of Drones (IoD), unmanned aerial vehicles (UAVs) or drones are deployed in
various mission-critical applications to collect sensitive data and disseminate it to the server …

A decentralized framework for device authentication and data security in the next generation internet of medical things

KP Satamraju, B Malarkodi - Computer Communications, 2021 - Elsevier
Abstract Internet of Things (IoT) applications have gained a huge momentum and have
spanned across all domains adding innovations to the prevailing solutions. The IoT …

Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading

R Hasan, M Hossain, R Khan - Future Generation Computer Systems, 2018 - Elsevier
The rapid growth of mobile applications requires enhanced computational resources in
order to ensure better performance, security, and usability. In recent years, the proliferation …

[HTML][HTML] A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives

M Hossain, G Kayas, R Hasan, A Skjellum, S Noor… - Future Internet, 2024 - mdpi.com
Driven by the rapid escalation of its utilization, as well as ramping commercialization,
Internet of Things (IoT) devices increasingly face security threats. Apart from denial of …

Post quantum public and private key cryptography optimized for IoT security

A Kaushik, LSS Vadlamani, MM Hussain… - Wireless Personal …, 2023 - Springer
The number of Internet of Things devices is growing exponentially with the introduction of
5G. They are incorporated into a wide spectrum of devices ranging from our mobile phones …