[HTML][HTML] Biometrics for internet-of-things security: A review

W Yang, S Wang, NM Sahri, NM Karie, M Ahmed… - Sensors, 2021 - mdpi.com
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …

A survey on internet of things: Applications, recent issues, attacks, and security mechanisms

G Uganya, Radhika, N Vijayaraj - Journal of Circuits, Systems and …, 2021 - World Scientific
The Internet of Things (IoT) is a series of recording devices, mechanical and automated
machines, documents, creatures, or individuals that have one of the user identifiers and the …

Context-sensitive access in industrial internet of things (IIoT) healthcare applications

F Al-Turjman, S Alturjman - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Industrial Internet of Things (IIoTs) is the fast growing network of interconnected things that
collects and exchange data using embedded sensors planted everywhere. Several IIoT …

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

R Amin, N Kumar, GP Biswas, R Iqbal… - Future Generation …, 2018 - Elsevier
With the widespread popularity and usage of Internet-enabled devices, Internet of things has
become one of the most popular techniques of the modern era. However, data generated …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks

M Ma, D He, H Wang, N Kumar… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The maturity of cloud computing, the Internet of Things technology, and intelligent
transportation system has promoted the rapid development of vehicular ad-hoc networks …

Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment

S Chatterjee, S Roy, AK Das… - … on Dependable and …, 2016 - ieeexplore.ieee.org
Multi-server environment is the most common scenario for a large number of enterprise
class applications. In this environment, user registration at each server is not recommended …

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards

D Mishra, AK Das, S Mukhopadhyay - Expert Systems with Applications, 2014 - Elsevier
Advancement in communication technology provides a scalable platform for various
services, where a remote user can access the server from anywhere without moving from its …

Design of a provably secure biometrics-based multi-cloud-server authentication scheme

S Kumari, X Li, F Wu, AK Das, KKR Choo… - Future Generation …, 2017 - Elsevier
Abstract Big Data and Cloud of Things (CoT) are two inter-related research trends in our
data-driven society, and one research challenge is to design efficient security solution that …

Anonymous secure framework in connected smart home environments

P Kumar, A Braeken, A Gurtov, J Iinatti… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The smart home is an environment, where heterogeneous electronic devices and
appliances are networked together to provide smart services in a ubiquitous manner to the …