A comprehensive survey on signcryption security mechanisms in wireless body area networks

S Hussain, SS Ullah, M Uddin, J Iqbal, CL Chen - Sensors, 2022 - mdpi.com
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in
healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the …

LAKA: lightweight authentication and key agreement protocol for internet of things based wireless body area network

M Soni, DK Singh - Wireless personal communications, 2022 - Springer
The concept of wireless body area network (WBAN) is conquered the medical field while
considering hospitals, patients, doctors to exchange crucial health data for efficient medical …

A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices

M Suárez-Albela, P Fraga-Lamas… - Sensors, 2018 - mdpi.com
The latest Internet of Things (IoT) edge-centric architectures allow for unburdening higher
layers from part of their computational and data processing requirements. In the specific …

Security attacks in internet of things

R Nair, P Sharma, DK Singh - Fog, Edge, and Pervasive …, 2020 - Wiley Online Library
Summary An Internet of Things (IoT) environment involves different types of devices such as
IoT devices/end nodes, computing devices, gateways/edges and cloud servers. Initially IoT …

[PDF][PDF] A Mutual Authentication Protocol for IoT Users in Cloud Environment

A Shahidinejad - Electronic and Cyber Defense, 2021 - ecdj.ihu.ac.ir
Ensuring the security of the Internet of Things (IoT) services and the related applications is
crucialin building users' trust in utilizing the Internet of Things platform. Data generated from …

Cryptanalysis of a robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things

D Rangwani, D Sadhukhan, S Ray - Cloud Security, 2021 - taylorfrancis.com
In 2013, W. Shi and P. Gong designed an Elliptic Curve Cryptography (ECC)-based
improved user authentication scheme covering almost all of the loopholes of Yeh et al.'s …

[PDF][PDF] On the Design of Efficient and Secure Heterogenous Generalized Signcryption for Wireless Body Sensor Networks

T Matloob - 2023 - thesis.cust.edu.pk
Abstract In Wireless Body Sensor Networks (WBSNs) various biosensor nodes ie, ECG,
EMG, EEG, BP, SpO2, respiratory rate, and body temperature are deployed on patient body …

Communication Security in IoT

R Yadav, V Kumar - Internet of Things: Security and Privacy in Cyberspace, 2022 - Springer
Abstract Internet of Things (IoT) is a network of connections of smart devices. This network is
made up of different components and terms such as RFID, sensor, network protocols …

[PDF][PDF] پروتکل احراز هویت متقابل برای کاربران اینترنت ‌اشیا در محیط ابری

شهیدی نژاد - پدافند الکترونیکی و سایبری, 2021‎ - ecdj.ihu.ac.ir
تضمین امنیت خدمات و کاربردهای اینترنت اشیا، فاکتور بسیار مهمی در ایجاد اعتماد در کاربران و
به‌کارگیری بستر اینترنت اشیا می‌باشد. داده‌های تولیدشده از دستگاه‌های مختلف هوشمند در …