[HTML][HTML] Authentication and identity management of IoHT devices: achievements, challenges, and future directions

M Mamdouh, AI Awad, AAM Khalaf, HFA Hamed - Computers & Security, 2021 - Elsevier
Abstract The Internet of Things (IoT) paradigm serves as an enabler technology in several
domains. Healthcare is one of the domains in which the IoT plays a vital role in increasing …

[HTML][HTML] Access management of IoT devices using access control mechanism and decentralized authentication: A review

I Singh, B Singh - Measurement: Sensors, 2023 - Elsevier
Blockchain is a distributed system that enables data transaction security, and its distributed
and decentralized design can be used to guarantee safe and scalable IoT device …

A blockchain-enabled architecture for IoMT device authentication

F Fotopoulos, V Malamas, TK Dasaklis… - 2020 IEEE Eurasia …, 2020 - ieeexplore.ieee.org
The healthcare sector is rapidly integrating the Internet of Medical Things (IoMT)
technologies and adopting new practices regarding how patient data are collected …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …

Centralised and distributed authentication scheme in internet of things: review and outlook

U Verma, D Bhardwaj - International Journal of Internet …, 2022 - inderscienceonline.com
Internet of things (IoT) is the promising technology in which devices equipped with
processors, actuators and sensors communicate with each other to serve a meaningful …

Blockchain-Based Multistage Continuous Authentication for Smart Devices

Y Yao, X Zhang, H Hu, H Liu, R Huang, Z Wang - Applied Sciences, 2023 - mdpi.com
With the increasing connectivity between multiple smart devices in the Internet of Vehicles,
privacy and security have become stringent threats due to unauthorized access. To …

A Secure ECC-Based Authentication Scheme to Resist Replay Attacks for the IoT

Y Feng, W Liu - Emerging Trends in Intelligent and Interactive Systems …, 2021 - Springer
Because of the resource-constrained characteristic of IoT devices, it is difficult to achieve
user authentication in IoT by using classical Internet's authentication schemes. The reply …

[PDF][PDF] Threat Intelligence-Driven Cybersecurity for IoT Ecosystems: A Raspberry Pi-based Analysis of Smart Home Security

SK Addison, J Isoaho, T Mohammad - 2024 - utupub.fi
Using Raspberry Pi as a representative smart home device, the research evaluates various
types of cyber attacks, including brute force and denial-of-service attacks, and assesses the …

Blockchain-Based Public Key Authentication of IoT Devices for Electrical Energy Systems

N Cardamone, V Dalena, A Mauro… - 2022 AEIT …, 2022 - ieeexplore.ieee.org
Information and communication technologies (ICT) support the digital evolution of energy
networks, enabling automated and smart operations. Internet of Things (IoT) devices allow …

Automated Host Verification and Authentication for IoT Devices Using Network Access Authentication Model

MASB Aziz - 2022 International Conference on Cyber …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) technology has grown and advanced significantly through years
providing multiple opportunities, features, and vast domains for future development. Much …