A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT

J Sengupta, S Ruj, SD Bit - Journal of network and computer applications, 2020 - Elsevier
In recent years, the growing popularity of Internet of Things (IoT) is providing a promising
opportunity not only for the development of various home automation systems but also for …

PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

Quantum2fa: efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi… - Computer Networks, 2020 - Elsevier
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …

TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment

J Srinivas, AK Das, N Kumar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …

Securing electronics healthcare records in healthcare 4.0: A biometric-based approach

JJ Hathaliya, S Tanwar, S Tyagi, N Kumar - Computers & Electrical …, 2019 - Elsevier
In recent years, there has been an exponential increase in the usage of Healthcare 4.0-
based diagnostics systems across the globe. In healthcare 4.0, the patient's records are …

A survey on healthcare data: a security perspective

AK Singh, A Anand, Z Lv, H Ko, A Mohan - ACM Transactions on …, 2021 - dl.acm.org
With the remarkable development of internet technologies, the popularity of smart healthcare
has regularly come to the fore. Smart healthcare uses advanced technologies to transform …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …

Provably secure ECC-based device access control and key agreement protocol for IoT environment

AK Das, M Wazid, AR Yannam, JJPC Rodrigues… - IEEE …, 2019 - ieeexplore.ieee.org
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …