Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks

VO Nyangaresi - Ad Hoc Networks, 2023 - Elsevier
Wireless body area networks have gained popularity due to their ability to enhance
efficiency, flexibility, convenience and the quality of life. In this environment, the patient …

Current research trends in IoT security: a systematic mapping study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

Security of internet of things based on cryptographic algorithms: a survey

SK Mousavi, A Ghaffari, S Besharat, H Afshari - Wireless Networks, 2021 - Springer
Abstract Internet of Things (IoT) is a new concept in Information and Communications
Technology and its structure is based on smart objects communications. It contributes to …

A review and analysis of secure and lightweight ECC‐based RFID authentication protocol for Internet of Vehicles

S Kumar, H Banka, B Kaushik… - Transactions on …, 2021 - Wiley Online Library
Radio‐frequency identification (RFID) technology has proliferated over the last few years
and being deployed as identification technology in numerous domains like intelligent …

A secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario

M Shariq, K Singh, MY Bajuri, AA Pantelous… - Sustainable Cities and …, 2021 - Elsevier
Abstract The Internet of Things (IoT) plays an important role in various healthcare
applications. Radio Frequency IDentification (RFID) is widely used as a leading …

An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment

S Izza, M Benssalah, K Drouiche - Journal of Information Security and …, 2021 - Elsevier
Abstract Nowadays, Internet of Things (IoT)-based E-healthcare represents an emergent
research field due to the fast development of wireless technologies and cloud computing …

SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism

M Zaminkar, R Fotohi - Wireless Personal Communications, 2020 - Springer
Abstract Through the Internet of Things (IoT) the internet scope is established by the
integration of physical things to classify themselves into mutual things. A physical thing can …

A formally verified message validation protocol for intelligent IoT E-health systems

VO Nyangaresi, J Ma - 2022 IEEE World Conference on …, 2022 - ieeexplore.ieee.org
High volumes of private and sensitive data are transmitted in intelligent Internet of Things
(IoT) e-health systems environment. As such, proper protection should be accorded to these …

An internet of healthcare things (IoHT)-based healthcare monitoring system

H Kaur, M Atif, R Chauhan - Advances in Intelligent Computing and …, 2020 - Springer
In current times, there is a demand for a system with its associated devices, individuals,
times, places, and networks fully integrated in the IoT. Internet of things has developed a …

Novel ECC-based RFID mutual authentication protocol for emerging IoT applications

S Gabsi, Y Kortli, V Beroulle, Y Kieffer, A Alasiry… - IEEE …, 2021 - ieeexplore.ieee.org
The implementation of RFID technology has globally impacted several industries and this
revolution has improved the aspects of service delivery in many sectors, such as logistics …