Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …

Security and internet of things: benefits, challenges, and future perspectives

H Taherdoost - Electronics, 2023 - mdpi.com
Due to the widespread use of the Internet of Things (IoT), organizations should concentrate
their efforts on system security. Any vulnerability could lead to a system failure or …

A secure and lightweight authentication protocol for IoT-based smart homes

JH Oh, SJ Yu, JY Lee, SH Son, MH Kim, YH Park - Sensors, 2021 - mdpi.com
With the information and communication technologies (ICT) and Internet of Things (IoT)
gradually advancing, smart homes have been able to provide home services to users. The …

GCACS-IoD: A certificate based generic access control scheme for Internet of drones

SA Chaudhry, K Yahya, M Karuppiah, R Kharel… - Computer Networks, 2021 - Elsevier
Internet of drones (IoD) has gained significant importance in recent times due to its
applications in several critical domains ranging from commercial to defense and rescue …

Stackelberg game for service deployment of IoT-enabled applications in 6G-aware fog networks

A Hazra, M Adhikari, T Amgoth… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Fog computing has emerged as a promising paradigm that borrows the user-oriented cloud
services to the proximity of the Internet-of-Things (IoT) users in sixth-generation (6G) …

Toward a secure smart-home IoT access control scheme based on home registration approach

TY Wu, Q Meng, YC Chen, S Kumari, CM Chen - Mathematics, 2023 - mdpi.com
The extensive application of the Internet of Things (IoT) and artificial intelligence technology
has greatly promoted the construction and development of smart cities. Smart home as the …

Blockchain-based authentication schemes in smart environments: A systematic literature review

MA Al Sibahee, ZA Abduljabbar… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
This study presents a systematic literature review on blockchain-based authentication in
smart environments that include smart city, smart home, smart grid, smart healthcare, smart …

[HTML][HTML] EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element

C Patel, AK Bashir, AA AlZubi, R Jhaveri - Digital Communications and …, 2023 - Elsevier
Abstract Industrial IoT (IIoT) aims to enhance services provided by various industries, such
as manufacturing and product processing. IIoT suffers from various challenges, and security …

Interval type-2 fuzzy temporal convolutional autoencoder for gait-based human identification and authentication

W Ding, M Abdel-Basset, H Hawash, N Moustafa - Information Sciences, 2022 - Elsevier
Cyborg intelligence has been devoted to enhancing the physical abilities of humans by
integrating artificial intelligence (AI) with in-the-body technologies and biological behaviors …

Feature selection based on double-hierarchical and multiplication-optimal fusion measurement in fuzzy neighborhood rough sets

H Gou, X Zhang - Information Sciences, 2022 - Elsevier
In fuzzy neighborhood rough sets (FNRSs), uncertainty measurement performs mainly
classification-hierarchical and multiplication-simple fusion, so the corresponding feature …