Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges

PR Babu, SAP Kumar, AG Reddy, AK Das - Computer Science Review, 2024 - Elsevier
This study provides an in-depth survey of quantum secure authentication and key
agreement protocols, investigating the dynamic landscape of cryptographic techniques …

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

Internet of things in Healthcare: a conventional literature review

B Singh, D Lopez, R Ramadan - Health and Technology, 2023 - Springer
Purpose The power of the Internet has impacted various industries, especially the
healthcare industry. With the rapid population growth and advancement of various sensor …

Enhancing the security: A lightweight authentication and key agreement protocol for smart medical services in the ioht

TY Wu, L Wang, CM Chen - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) has witnessed significant growth with advancements in Internet
and wireless technologies. In the medical field, the Internet of Health Things (IoHT) has …

Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors

MN Khan, I Khalil, I Ullah, SK Singh, S Dhahbi, H Khan… - Internet of Things, 2024 - Elsevier
Today is the age of superconductivity where each object connects in a cascading manner to
other objects, allowing for seamless integration of real-world objects into the digital domain …

Qsmah: a novel quantum-based secure cryptosystem using mutual authentication for healthcare in the internet of things

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Healthcare in IoT provides many benefits, such as real-time data transfer and decision-
making based on the information received from the patient's Body Sensor Nodes (BSNs) …

Quantum-Resistant Cryptography

AM Widodo, P Pappachan, BA Sekti… - Innovations in Modern …, 2024 - igi-global.com
Quantum-resistant cryptography develops cryptographic protocols and algorithms that can
withstand attacks from quantum computers. Quantum computers can solve certain …

Securing access to internet of medical things using a graphical-password-based user authentication scheme

MA Khan, IU Din, A Almogren - Sustainability, 2023 - mdpi.com
Digital healthcare services have seen significant growth in this decade and many new
technologies have been thoroughly examined to provide efficient services through secure …

[HTML][HTML] An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security

O Popoola, MA Rodrigues, J Marchang, A Shenfield… - Internet of Things, 2024 - Elsevier
This study proposes an optimized hybrid encryption framework combining ECC-256r1 with
AES-128 in EAX mode, tailored for smart home healthcare environments, and conducts a …

Excavating Vulnerabilities Lurking in Multi-Factor Authentication Protocols: A Systematic Security Analysis

AK Wee, EG Chekole, J Zhou - arXiv preprint arXiv:2407.20459, 2024 - arxiv.org
Nowadays, cyberattacks are growing exponentially, causing havoc to Internet users. In
particular, authentication attacks constitute the major attack vector where intruders …