Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2024 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones

M Tanveer, N Kumar, MM Hassan - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …

REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things

M Tanveer, A Alkhayyat, N Kumar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the widespread utilization of Internet-enabled smart devices (SDs), the Industrial
Internet of Things (IIoT) has become prevalent in recent years. SDs exchange information …

Hybrid cryptographic approach to enhance the mode of key management system in cloud environment

S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …

LAKE-6SH: Lightweight user authenticated key exchange for 6LoWPAN-based smart homes

M Tanveer, G Abbas, ZH Abbas, M Bilal… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Ensuring security and privacy in the Internet of Things (IoT) while taking into account the
resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT …

RUAM-IoD: A robust user authentication mechanism for the Internet of Drones

M Tanveer, A Alkhayyat, A Naushad, N Kumar… - IEEE …, 2022 - ieeexplore.ieee.org
The revolutionary advancement in the capabilities of hardware tools, software packages,
and communication techniques gave rise to the Internet of Things-supported drone networks …

REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system

M Tanveer, A Alkhayyat, SA Chaudhry, YB Zikria… - IEEE …, 2022 - ieeexplore.ieee.org
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing
applications for the Internet of Things (IoT). E-healthcare is considered the essential service …

A robust access control protocol for the smart grid systems

M Tanveer, N Kumar, A Naushad… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Lightweight cryptography (LWC)-based authenticated encryption with associative data
(AEAD) cryptographic primitives require fewer computational and energy resources than …

A secure remote user authentication scheme for 6LoWPAN-based Internet of Things

G Abbas, M Tanveer, ZH Abbas, M Waqas, T Baker… - PloS one, 2021 - journals.plos.org
One of the significant challenges in the Internet of Things (IoT) is the provisioning of
guaranteed security and privacy, considering the fact that IoT devices are resource-limited …

ARAP-SG: Anonymous and reliable authentication protocol for smart grids

M Tanveer, H Shah, A Alkhayyat, SA Chaudhry… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things-enabled smart grid (SG) technology provides ample advantages to
traditional power grids. In an SG system, the smart meter (SM) is the critical component that …