[HTML][HTML] Key agreement and authentication protocols in the Internet of Things: A survey

S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …

[HTML][HTML] 5G technology in the digital transformation of healthcare, a systematic Review

M Cabanillas-Carbonell, J Pérez-Martínez, J A. Yáñez - Sustainability, 2023 - mdpi.com
The world is currently facing one of the biggest problems related to health and the quality of
healthcare. According to the goals outlined by WHO in the blueprint for sustainable …

Design of secure mutual authentication scheme for metaverse environments using blockchain

J Ryu, S Son, J Lee, Y Park, Y Park - Ieee Access, 2022 - ieeexplore.ieee.org
During the COVID-19 pandemic, engagement in various remote activities such as online
education and meetings has increased. However, since the conventional online …

An integrated Fuzzy-BWM, Fuzzy-LBWA and V-Fuzzy-CoCoSo-LD model for gateway selection in fog-bolstered Internet of Things

SO Ogundoyin, IA Kamil - Applied Soft Computing, 2023 - Elsevier
This study proposes a fog gateway selection strategy based on a hybrid Multi-criteria
Decision-Making (MCDM) optimization model to avoid overwhelming the fog–cloud network …

[PDF][PDF] Amassing the security: An enhanced authentication and key agreement protocol for remote surgery in healthcare environment

TY Wu, Q Meng, L Yang, S Kumari… - Comput. Model. Eng …, 2023 - cdn.techscience.cn
The development of the Internet of Things has facilitated the rapid development of various
industries. With the improvement in people's living standards, people's health requirements …

An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy

SO Ogundoyin, IA Kamil - Vehicular Communications, 2021 - Elsevier
Privacy, security and efficiency are important performance issues in vehicular ad hoc
network (VANET), which researchers have tried to address in recent years. This research …

[HTML][HTML] ECC-based three-factor authentication and key agreement scheme for wireless sensor networks

W Huang - Scientific Reports, 2024 - nature.com
In wireless sensor networks (WSNs), protocols with authentication and key agreement
functions can enhance the security of the interaction between users and sensor nodes …

Lightweight cloud computing-based RFID authentication protocols using PUF for e-healthcare systems

TF Lee, KW Lin, YP Hsieh, KC Lee - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
In the presence of convenience, cloud computing services have increasingly become used
to resolve low-latency and high-efficiency issues. In particular, they can help medical staff …

A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet

N Kumar, R Ali - Computer Networks, 2024 - Elsevier
An intelligent robotic surgical system, utilizing the capabilities of 6G-enabled Tactile Internet
(TI) and blockchain technology, holds remarkable promise for providing remote healthcare …

Blockchain-enabled authentication framework for Maritime Transportation System empowered by 6G-IoT

N Kumar, R Ali - Computer Networks, 2024 - Elsevier
Abstract In recent years, Maritime Transportation Systems (MTS) have experienced
significant advancements through the adoption of Internet of Things (IoT) technology. The …