A survey on security and authentication in wireless body area networks

B Narwal, AK Mohapatra - Journal of Systems Architecture, 2021 - Elsevier
Abstract Wireless Body Area Networks (WBAN) is often envisioned as a paradigm shift from
the traditional healthcare system to the modern E-Healthcare system. The patient's vitals …

Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap

M Wazid, AK Das, S Shetty, P Gope… - IEEE …, 2020 - ieeexplore.ieee.org
5G mobile communication systems promote the mobile network to not only interconnect
people, but also interconnect and control the machine and other devices. 5G-enabled …

A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things

J Miao, Z Wang, Z Wu, X Ning, P Tiwari - Expert Systems with Applications, 2024 - Elsevier
Over the last decade, with the increasing popularity and usage of the internet of things
worldwide, Internet of Medical Things (IoMT) has emerged as a key technology of the …

Design of secure user authenticated key management protocol for generic IoT networks

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …

BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment

N Garg, M Wazid, AK Das, DP Singh… - IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) is a kind of connected infrastructure of smart medical
devices along with software applications, health systems and services. These medical …

Secure remote user authenticated key establishment protocol for smart home environment

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …

A secure authenticated and key exchange scheme for fog computing

CM Chen, Y Huang, KH Wang, S Kumari… - Enterprise Information …, 2021 - Taylor & Francis
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …

Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial Internet of Things deployment

AK Das, M Wazid, N Kumar… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Due to the widespread popularity of Internet-enabled devices, Industrial Internet of Things
(IIoT) becomes popular in recent years. However, as the smart devices share the information …

Design of secure key management and user authentication scheme for fog computing services

M Wazid, AK Das, N Kumar, AV Vasilakos - Future Generation Computer …, 2019 - Elsevier
Fog computing (fog networking) is known as a decentralized computing infrastructure in
which data, applications, compute as well as data storage are scattered in the most logical …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …