Healthcare internet of things: Security threats, challenges and future research directions

M Adil, MK Khan, N Kumar, M Attique… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications are switching from general to precise in different
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …

A survey on post‐quantum based approaches for edge computing security

A Karakaya, A Ulu - Wiley Interdisciplinary Reviews …, 2024 - Wiley Online Library
With the development of technology and its integration with scientific realities, computer
systems continue to evolve as infrastructure. One of the most important obstacles in front of …

A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment

VB Chenam, ST Ali - Journal of Information Security and Applications, 2023 - Elsevier
One of the essential technologies in the medical industry for achieving high performance
and accuracy is the Medical Internet of Things (MIoT). The MIoT technology processes a …

Reliable data communication using post‐quantum encryption in Internet of Everything

A Balaji, SK Dhurandher - International Journal of …, 2022 - Wiley Online Library
Summary Internet of Everything (IoE) is one of the emerging technologies in the
advancement of digital life and innovation. But the major issue that is to be addressed is the …

liteGAP: Lightweight Group Authentication Protocol for Internet of Drones Systems

C Pu, C Warner, KKR Choo, S Lim… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Over the past few years, the synergic usage of unmanned aerial vehicles (later drones) and
Internet of Things (IoT) has successfully transformed into the Internet of Drones (IoD) …

Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review

M Ataullah, N Chauhan - Security and Privacy, 2024 - Wiley Online Library
In the era heavily influenced by Internet of Things (IoT), prioritizing strong security and the
protection of user privacy is of utmost importance. This comprehensive review paper …

Pine: Post-quantum based incentive technique for non-cooperating nodes in internet of everything

A Balaji, SK Dhurandher, I Woungang - Sensors, 2022 - mdpi.com
The Internet of Everything (IoE) is a smart system that interconnects smart entities by
incorporating low-cost or low-energy gadgets that are useful for communication with people …

Performance evaluation of group OSCORE for secure group communication in the Internet of Things

M Gunnarsson, KM Malarski, R Höglund… - ACM Transactions on …, 2022 - dl.acm.org
The Constrained Application Protocol (CoAP) is a major application-layer protocol for the
Internet of Things (IoT). The recently standardized security protocol Object Security for …

About Scalability and End-to-End Security in Internet of Things: An Overview

H Kandil, H Benaboud - Proceedings of the 7th International Conference …, 2024 - dl.acm.org
The Internet of Things (IoT) is a continually expanding network of advanced nodes that are
interconnected through the Internet, with the capacity to transmit and collect data over a …

Communication Security in IoT

R Yadav, V Kumar - Internet of Things: Security and Privacy in Cyberspace, 2022 - Springer
Abstract Internet of Things (IoT) is a network of connections of smart devices. This network is
made up of different components and terms such as RFID, sensor, network protocols …