SAAF-IoD: Secure and anonymous authentication framework for the Internet of Drones

M Tanveer, H Alasmary, N Kumar… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Internet of Drones (IoD) offers several advantages, such as enabling ground
communications in areas with connectivity limitations due to physical obstacles. However …

Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

Secure Registration Protocol for the Internet of Drones Using Blockchain and Physical Unclonable Function Technology

N Oláh, B Molnár, A Huszti - Symmetry, 2023 - mdpi.com
Unmanned aerial vehicles (UAVs) have become increasingly popular in recent years and
are applied in various fields, from commercial and scientific to military and humanitarian …

LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things

M Tanveer, SA Chelloug, M Ahmad… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a revolutionary communication technology,
enabling the connection of resource-limited devices to the Internet. These devices are …

PSAF-IoT: Physically Secure Authentication Framework for the Internet of Things

O Alruwaili, FM Alotaibi, M Tanveer, S Chaoui… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) revolutionizes connectivity, as IoT devices grow exponentially,
vulnerabilities emerge, ranging from data breaches to device hijacking. Thus there is the …

RAP-MEC: Robust Authentication Protocol for the Mobile Edge Computing Services

FM Alotaibi, LA Maghrabi, M Tanveer, M Ahmad… - IEEE …, 2024 - ieeexplore.ieee.org
The emergence of edge computing has revolutionized the landscape of modern
applications, offering remarkable advantages such as low-latency and high-bandwidth …

[HTML][HTML] A biometric and physically unclonable function–Based authentication protocol for payload exchanges in internet of drones

VO Nyangaresi, IM Al-Joboury, KA Al-sharhanee… - e-Prime-Advances in …, 2024 - Elsevier
Abstract Internet of Drones (IoD) has been deployed in numerous military and civilian
domains to offer services such as target surveillance, traffic monitoring, disaster handling …

IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON

M Al-Shatari, FA Hussin, AA Aziz, TAE Eisa, XT Tran… - Applied Sciences, 2023 - mdpi.com
IoT devices and embedded systems are deployed in critical environments, emphasizing
attributes like power efficiency and computational capabilities. However, these constraints …

A Secure Authentication Framework for Consumer Mobile Crowdsourcing Networks

A Aldosary, M Tanveer, M Ahmad… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The Mobile crowdsourcing network (MCN) leverages collaborative intelligence to solve
complex tasks through group cooperation. It comprises three main components: the end …

A Communication-Efficient, Privacy-Preserving Federated Learning Algorithm Based on Two-Stage Gradient Pruning and Differentiated Differential Privacy

Y Li, W Du, L Han, Z Zhang, T Liu - Sensors, 2023 - mdpi.com
There are several unsolved problems in federated learning, such as the security concerns
and communication costs associated with it. Differential privacy (DP) offers effective privacy …