Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles

Z Ali, SA Chaudhry, MS Ramzan, F Al-Turjman - IEEE Access, 2020 - ieeexplore.ieee.org
The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being
practiced in many military and civilian-based applications. IoD facilitates real-time data …

A secure authenticated and key exchange scheme for fog computing

CM Chen, Y Huang, KH Wang, S Kumari… - Enterprise Information …, 2021 - Taylor & Francis
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …

Application of quantum genetic optimization of LVQ neural network in smart city traffic network prediction

F Zhang, TY Wu, Y Wang, R Xiong, G Ding, P Mei… - IEEE …, 2020 - ieeexplore.ieee.org
Accurate prediction of traffic flow in urban networks is of great significance for smart city
management. A short-term traffic flow prediction algorithm of Quantum Genetic Algorithm …

A secure and reliable device access control scheme for IoT based sensor cloud systems

SA Chaudhry, K Yahya, F Al-Turjman, MH Yang - Ieee Access, 2020 - ieeexplore.ieee.org
Among other security concerns, the reliable device to device direct communication is an
important research aspect in sensor cloud system application of Internet of things (IoT). The …

A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain

EK Wang, CM Chen, MM Hassan… - Future Generation …, 2020 - Elsevier
Abstract Medical Image Segmentation is the process of automatic or semi-automatic
detection of boundaries within a 2D or 3D image in Internet-of-Medical-Things (IoMT) …

An authenticated key exchange protocol for multi-server architecture in 5G networks

TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the
amount of data, so multi-server distributed cloud computing has been widely used in various …

An enhanced pairing-based authentication scheme for smart grid communications

TY Wu, YQ Lee, CM Chen, Y Tian… - Journal of Ambient …, 2021 - Springer
To ensure that messages can be securely transmitted between different entities in a smart
grid, many researchers have focused on authentication and key exchange schemes. Chen …

Improved authenticated key agreement scheme for fog‐driven IoT healthcare system

TY Wu, T Wang, YQ Lee, W Zheng… - Security and …, 2021 - Wiley Online Library
The Internet of things (IoT) has been widely used for various applications including medical
and transportation systems, among others. Smart medical systems have become the most …

A robust authentication and access control protocol for securing wireless healthcare sensor networks

Z Ali, A Ghani, I Khan, SA Chaudhry, SKH Islam… - Journal of Information …, 2020 - Elsevier
Abstract Wireless Healthcare Sensor Network (WHSN) has become one of the major
research fields over the past decades that play a very prominent role in the medical field …

Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …