Security in IoMT communications: A survey

D Koutras, G Stergiopoulos, T Dasaklis… - Sensors, 2020 - mdpi.com
The Internet of Medical Things (IoMT) couples IoT technologies with healthcare services in
order to support real-time, remote patient monitoring and treatment. However, the …

A secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario

M Shariq, K Singh, MY Bajuri, AA Pantelous… - Sustainable Cities and …, 2021 - Elsevier
Abstract The Internet of Things (IoT) plays an important role in various healthcare
applications. Radio Frequency IDentification (RFID) is widely used as a leading …

Enhancing the security: A lightweight authentication and key agreement protocol for smart medical services in the ioht

TY Wu, L Wang, CM Chen - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) has witnessed significant growth with advancements in Internet
and wireless technologies. In the medical field, the Internet of Health Things (IoHT) has …

Replay attack detection in smart cities using deep learning

AA Elsaeidy, N Jagannath, AG Sanchis… - IEEE …, 2020 - ieeexplore.ieee.org
Intrusion detection is an important and challenging problem that has a major impact on
quality and reliability of smart city services. To this extent, replay attacks have been one of …

IoT in medical & pharmaceutical: Designing lightweight RFID security protocols for ensuring supply chain integrity

M Safkhani, S Rostampour, Y Bendavid, N Bagheri - Computer Networks, 2020 - Elsevier
Nowadays the sharing of trade in counterfeit and pirated goods is constantly growing and
fake products are found in a large number of industries–particularly pharmaceuticals, food …

A lightweight authentication scheme for telecare medical information system

L Xiao, S Xie, D Han, W Liang, J Guo… - Connection …, 2021 - Taylor & Francis
The rapid development of information technology promotes the development and
application of Telecare Information System (TMIS). However, TMIS also has security …

[HTML][HTML] ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags

M Shariq, K Singh, C Lal, M Conti, T Khan - Computer Networks, 2022 - Elsevier
Abstract Internet of Things (IoT) technologies rapidly evolve and are used in many real-life
applications. One of the core technologies used in various IoT applications is Radio …

A robust device-to-device continuous authentication protocol for the internet of things

A Badhib, S Alshehri, A Cherif - IEEE Access, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is a heterogeneous environment that connects billions of
devices. Thus, it is a significantly high-value target for attackers and suffers from several …

SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement

R Hajian, S ZakeriKia, SH Erfani, M Mirabi - Computer Networks, 2020 - Elsevier
Security in wearable sensor networks and telecare medical information systems (TMIS) has
turned to an issue of scholarly interest in recent years. Adequate security to agree on a …

Symmetric cryptography with a chaotic map and a multilayer machine learning network for physiological signal infosecurity: Case study in electrocardiogram

CH Lin, JX Wu, PY Chen, CM Li, NS Pai, CL Kuo - IEEE Access, 2021 - ieeexplore.ieee.org
Digital physiological signals in telecare medicine information systems have been widely
applied in remote medical applications, such as telecare, tele-examination, and …