Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

Healthcare internet of things: Security threats, challenges and future research directions

M Adil, MK Khan, N Kumar, M Attique… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications are switching from general to precise in different
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …

A lightweight ECC-based authentication scheme for Internet of Things (IoT)

B Hammi, A Fayad, R Khatoun, S Zeadally… - IEEE Systems …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) enables the interconnection of physical and virtual objects that are
managed by various types of hardware, software, and communication technologies. The …

A review on lightweight cryptography for Internet-of-Things based applications

V Rao, KV Prema - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Abstract The Internet-of-Things (IoT) is a combination of an intelligent infrastructure
combined with various self-organizing devices. These devices are used to monitor the …

An efficient approach for rice prediction from authenticated Block chain node using machine learning technique

A Nesarani, R Ramar, S Pandian - Environmental Technology & Innovation, 2020 - Elsevier
With the advent of Internet of Things (IoT), even devices communicate without human
intervention. Even though many cryptographic schemes provide secure communication …

Secure multi-factor access control mechanism for pairing blockchains

AA Addobea, Q Li, IA Obiri Jr, J Hou - Journal of Information Security and …, 2023 - Elsevier
Digitalization has made it easier for centric systems to transition from single-factor to two-
factor authentication. However, several access control practices struggle to authenticate …

[PDF][PDF] A review of cyber security challenges attacks and solutions for Internet of Things based smart home

TA Abdullah, W Ali, S Malebary… - Int. J. Comput. Sci. Netw …, 2019 - researchgate.net
Internet of things (IoT) has been becoming an influential compound of the future since it
provides a promising technology with great potential for addressing many societal …

A parallelized database damage assessment approach after cyberattack for healthcare systems

S Kaddoura, RA Haraty, K Al Kontar, O Alfandi - Future Internet, 2021 - mdpi.com
In the current Internet of things era, all companies shifted from paper-based data to the
electronic format. Although this shift increased the efficiency of data processing, it has …

A provable secure cybersecurity mechanism based on combination of lightweight cryptography and authentication for Internet of Things

AA Ahmed, SJ Malebary, W Ali, AA Alzahrani - Mathematics, 2023 - mdpi.com
Internet of Things devices, platform programs, and network applications are all vulnerable to
cyberattacks (digital attacks), which can be prevented at different levels by using …

STRIDE-based cyber security threat modeling for IoT-enabled precision agriculture systems

MR Al Asif, KF Hasan, MZ Islam… - 2021 3rd International …, 2021 - ieeexplore.ieee.org
The concept of traditional farming is changing rapidly with the introduction of smart
technologies like the Internet of Things (IoT). Under the concept of smart agriculture …