[HTML][HTML] Barriers and facilitators that influence telemedicine-based, real-time, online consultation at patients' homes: systematic literature review

HKY Almathami, KT Win… - Journal of medical Internet …, 2020 - jmir.org
Background Health care providers are adopting information and communication
technologies (ICTs) to enhance their services. Telemedicine is one of the services that rely …

IoMT malware detection approaches: analysis and research challenges

M Wazid, AK Das, JJPC Rodrigues, S Shetty… - IEEE …, 2019 - ieeexplore.ieee.org
The advancement in Information and Communications Technology (ICT) has changed the
entire paradigm of computing. Because of such advancement, we have new types of …

Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography

VO Nyangaresi - Journal of Systems Architecture, 2022 - Elsevier
The communication channel between the smart home devices and the remote users is
susceptible to numerous privacy and security compromise attacks. To address these issues …

Secure remote user authenticated key establishment protocol for smart home environment

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …

Anonymous authentication scheme for smart home environment with provable security

M Shuai, N Yu, H Wang, L Xiong - Computers & Security, 2019 - Elsevier
Smart home is an emerging paradigm of the Internet of Things (IoT), which facilitates an
individual to operate the smart home appliances remotely through the internet. Since the …

Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap

M Wazid, AK Das, S Shetty, P Gope… - IEEE …, 2020 - ieeexplore.ieee.org
5G mobile communication systems promote the mobile network to not only interconnect
people, but also interconnect and control the machine and other devices. 5G-enabled …

[HTML][HTML] A survey on zero trust architecture: Challenges and future trends

Y He, D Huang, L Chen, Y Ni, X Ma - Wireless Communications and …, 2022 - hindawi.com
The traditional perimeter-based network protection model cannot adapt to the development
of current technology. Zero trust is a new type of network security model, which is based on …

An enhanced security framework for home appliances in smart home

WM Kang, SY Moon, JH Park - Human-centric Computing and Information …, 2017 - Springer
Since the end of 2000, smartphones have explosively spread and have made people's lives
plentiful. With the start of smartphones, new smart devices, including tablet PCs, smart TVs …

A secure and lightweight authentication protocol for IoT-based smart homes

JH Oh, SJ Yu, JY Lee, SH Son, MH Kim, YH Park - Sensors, 2021 - mdpi.com
With the information and communication technologies (ICT) and Internet of Things (IoT)
gradually advancing, smart homes have been able to provide home services to users. The …

A formally validated authentication algorithm for secure message forwarding in smart home networks

VO Nyangaresi - SN Computer Science, 2022 - Springer
The many devices connected in smart homes increase the attack surfaces from which
adversaries can invade the network. In addition, majority of these smart devices have …