Robustness, security and privacy in location-based services for future IoT: A survey

L Chen, S Thombre, K Järvinen, ES Lohan… - Ieee …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) connects sensing devices to the Internet for the purpose of
exchanging information. Location information is one of the most crucial pieces of information …

[HTML][HTML] Security and privacy issues in implantable medical devices: A comprehensive survey

C Camara, P Peris-Lopez, JE Tapiador - Journal of biomedical informatics, 2015 - Elsevier
Bioengineering is a field in expansion. New technologies are appearing to provide a more
efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) …

An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography

D He, S Zeadally - IEEE internet of things journal, 2014 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …

Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database

U Chatterjee, V Govindan, R Sadhukhan… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Physically Unclonable Functions (PUFs) promise to be a critical hardware primitive to
provide unique identities to billions of connected devices in Internet of Things (IoTs). In …

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

P Gope, R Amin, SKH Islam, N Kumar… - Future Generation …, 2018 - Elsevier
With the rapid development of device-to-device and machine-to-machine communication,
there is an exponential increase in the usage of various smart applications, such as …

A PUF-based secure communication protocol for IoT

U Chatterjee, RS Chakraborty… - ACM Transactions on …, 2017 - dl.acm.org
Security features are of paramount importance for the Internet of Things (IoT), and
implementations are challenging given the resource-constrained IoT setup. We have …

Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base

J Noorman, P Agten, W Daniels, R Strackx… - 22nd USENIX Security …, 2013 - usenix.org
In this paper we propose Sancus, a security architecture for networked embedded devices.
Sancus supports extensibility in the form of remote (even third-party) software installation on …

Sancus 2.0: A low-cost security architecture for iot devices

J Noorman, JV Bulck, JT Mühlberg, F Piessens… - ACM Transactions on …, 2017 - dl.acm.org
The Sancus security architecture for networked embedded devices was proposed in 2013 at
the USENIX Security conference. It supports remote (even third-party) software installation …

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

V Kumar, M Ahmad, D Mishra, S Kumari… - Vehicular …, 2020 - Elsevier
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …

A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

YP Liao, CM Hsiao - Ad hoc networks, 2014 - Elsevier
Abstract IoT (Internet of Things) is a type of network where ICT (Information and
Communication Technology) links any physical objects to the internet to perform information …