Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives

MR Alagheband, A Mashatan - Internet of Things, 2022 - Elsevier
Abstract Internet of Things (IoT) systems in different areas, such as manufacturing,
transportation, and healthcare, are the convergence of several technologies. There are …

A provably secure and practical PUF-based end-to-end mutual authentication and key exchange protocol for IoT

S Li, T Zhang, B Yu, K He - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
Device authentication and key exchange are essential issues for Internet of Things (IoT)
which plays an indispensable role in modern life. Many sensor devices in IoT, with limited …

An anonymous pre-authentication and post-authentication scheme assisted by cloud for medical IoT environments

R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) environment assisted by a cloud server is an emerging
conceptual model which incorporates the benefits of both IoT and cloud. In such an …

[HTML][HTML] Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for internet of things environment

U Ali, MYIB Idris, J Frnda, MNB Ayub, MA Khan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a fast-growing technology that enable existing
systems to communicate with one another by using new devices such as sensors and other …

Securing IT/OT links for low power IIoT devices: design considerations for industry 4.0

S Mantravadi, R Schnyder, C Møller, TD Brunoe - Ieee Access, 2020 - ieeexplore.ieee.org
Manufacturing is facing a host of new security challenges due to the convergence of
information technology (IT) and operational technology (OT) in the industry. This article …

A reliable physical layer key generation scheme based on RSS and LSTM network in VANET

Z Wang, Y Liu, J Wang, Z Li, Z Li… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
With the rapid development of information and communication technology, vehicular AD hoc
networks (VANETs) has attracted more and more attention. In order to provide traffic safety …

ECC-based authenticated key agreement protocol for industrial control system

Y Chen, F Yin, S Hu, L Sun, Y Li, B Xing… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the
industrial control systems (ICSs) have been used extensively, which has brought more and …

A review on privacy requirements and application layer security in internet of things (IoT)

KS Sudha, N Jeyanthi - Cybernetics and Information Technologies, 2021 - sciendo.com
Internet of Things (IoT) is the predominant emerging technology that targets on facilitating
interconnection of internet-enabled resources. IoT applications concentrate on automating …

PPCA-privacy-preserving collision avoidance for autonomous unmanned aerial vehicles

P Tedeschi, S Sciancalepore… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Current collision avoidance techniques deployed on Unmanned Aerial Vehicles (UAVs) rely
on short-range sensors, such as proximity sensors, cameras, and microphones …

Energy-efficient and secure communication toward UAV networks

T Li, J Zhang, MS Obaidat, C Lin, Y Lin… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Wireless networks ensure the unmanned aerial vehicles (UAVs) communicate and
cooperate with each other, which plays an indispensable role among UAVs. The two crucial …