Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview

P Nayak, G Swapna - Internet of Things, 2023 - Elsevier
Security is one of the major concerns in IoT networks which consists of a huge number of
objects that have given an alarm with the risen number of threats in our day-to-day life …

Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …

SPCBIG-EC: a robust serial hybrid model for smart contract vulnerability detection

L Zhang, Y Li, T Jin, W Wang, Z Jin, C Zhao, Z Cai… - Sensors, 2022 - mdpi.com
With countless devices connected to the Internet of Things, trust mechanisms are especially
important. IoT devices are more deeply embedded in the privacy of people's lives, and their …

A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications

R Praveen, P Pabitha - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Abstract The Internet of Medical Things (IoMT) is a network of medical devices, hardware
infrastructure, and software that allows healthcare information technology to be …

A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices

S Kumari, M Singh, R Singh, H Tewari - Computer Networks, 2022 - Elsevier
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …

Blockchain‐empowered secure and privacy‐preserving health data sharing in edge‐based IoMT

X Nie, A Zhang, J Chen, Y Qu… - Security and …, 2022 - Wiley Online Library
Health data sharing, as a booming demand, enables the patients with similar symptoms to
connect with each other and doctors to obtain the medical history of patients. Health data are …

CS-LAKA: A lightweight authenticated key agreement protocol with critical security properties for IoT environments

Y Guo, Y Guo - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Anonymity, robust synchronization, and perfect forward secrecy are the most important
security properties of authenticated key agreement (AKA) protocols. Designing AKA …

An improved lightweight two-factor authentication protocol for IoT applications

AMA Modarres, G Sarbishaei - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
The Internet of things (IoT) is defined as a network of connected objects or devices that
gather information and share or exchange them through communication systems. In many …

Highly efficient bidirectional multi-factor authentication and key agreement for real-time access to sensor data

A Braeken - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
This article presents an authentication and key agreement protocol for users who want to
have access to constrained sensor nodes deployed in the field, eg, doctor with healthcare …

An unconditionally secured privacy-preserving authentication scheme for smart metering infrastructure in smart grid

K Prateek, S Maity, R Amin - IEEE Transactions on Network …, 2022 - ieeexplore.ieee.org
Industry 4.0 allows faster data accessibility, improved performance, fault identification, and
remote control of machines within any smart factory. Due to the massive generation of delay …