Security and privacy issues in smart cities/industries: technologies, applications, and challenges

PM Rao, BD Deebak - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
The development of the Internet of things (IoT) is rapidly growing everywhere in our daily
lives. Advanced information and communication technologies play a vital role in the …

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

Amassing the security: An enhanced authentication protocol for drone communications over 5G networks

T Wu, X Guo, Y Chen, S Kumari, C Chen - Drones, 2021 - mdpi.com
At present, the great progress made by the Internet of Things (I o T) has led to the
emergence of the Internet of Drones (I o D). I o D is an extension of the I o T, which is used to …

An anonymous ECC-based self-certified key distribution scheme for the smart grid

D Abbasinezhad-Mood… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In the smart grid, the various stakeholders can communicate securely and efficiently only if
they employ a proper key distribution scheme. In recent years, a number of key distribution …

Improved authenticated key agreement scheme for fog‐driven IoT healthcare system

TY Wu, T Wang, YQ Lee, W Zheng… - Security and …, 2021 - Wiley Online Library
The Internet of things (IoT) has been widely used for various applications including medical
and transportation systems, among others. Smart medical systems have become the most …

Wireless sensor network security: A recent review based on state-of-the-art works

M Faris, MN Mahmud, MFM Salleh… - International Journal of …, 2023 - journals.sagepub.com
Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is
applied in many aspects, including surveillance battlefields, patient medical monitoring …