PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

A comprehensive survey on hardware-assisted malware analysis and primitive techniques

EP Kumar, S Priyanka - Computer Networks, 2023 - Elsevier
Malware poses an extremely dangerous threat to the digital world, significantly impacting
various domains such as smart cities, intelligent transportation, wireless sensor networks …

Lightweight authenticated key agreement for smart metering in smart grid

SH Baghestani, F Moazami… - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Nowadays, with the overconsumption of energy, researchers attempt to optimally manage
energy consumption and prevent it from being wasted. One beneficial way to manage …

PRLAP-IoD: A PUF-based robust and lightweight authentication protocol for Internet of Drones

Z Zhang, C Hsu, MH Au, L Harn, J Cui, Z Xia, Z Zhao - Computer Networks, 2024 - Elsevier
In recent years, the industry and research have cast great attention to the Internet of Drones
(IoD), which is becoming progressively popular since it can bring a great convenience to …

Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment

KAA Mutlaq, VO Nyangaresi, MA Omar… - … Conference on Applied …, 2022 - Springer
The traditional power grid systems are being replaced with smart grids so as to offer the
required levels of flexibility, reliability, efficiency and dynamic power adjustments. However …

Toward smart home authentication using PUF and edge-computing paradigm

TY Wu, F Kong, L Wang, YC Chen, S Kumari, JS Pan - Sensors, 2022 - mdpi.com
The smart home is a crucial embodiment of the internet of things (IoT), which can facilitate
users to access smart home services anytime and anywhere. Due to the limited resources of …

A cybersecurity user authentication approach for securing smart grid communications

A Tolba, Z Al-Makhadmeh - Sustainable Energy Technologies and …, 2021 - Elsevier
The smart grid provides technology that offers power solutions by integrating wireless
access, renewable energy resources, smart meters, and smart appliances. Energy …

A Comprehensive Review on Cyber-attacks in Power Systems: Impact Analysis, Detection and Cyber security

N Tatipatri, SL Arun - IEEE Access, 2024 - ieeexplore.ieee.org
Continuous communication and information technology advancements facilitate the
modernization of the conventional energy grid into an integrated platform. Internet-of-Things …

Non-invasive challenge response authentication for voice transactions with smart home behavior

V Hayashi, W Ruggiero - Sensors, 2020 - mdpi.com
Smart speakers, such as Alexa and Google Home, support daily activities in smart home
environments. Even though voice commands enable friction-less interactions, existing …

Lightweight secure authentication and key agreement technique for smart grid

D Kumari, K Singh - Peer-to-Peer Networking and Applications, 2024 - Springer
In the last decade, complex engineering systems have been made automatic, smart, and
intelligent by adding computation, communication, and monitoring into systems such as Grid …