Digital twin-supported smart city: Status, challenges and future research directions

H Wang, X Chen, F Jia, X Cheng - Expert Systems with Applications, 2023 - Elsevier
A city can be considered a carrier of multiple sources of data and information that are
updated in real time and experiences continuous operation and development. Therefore, a …

[HTML][HTML] User-centric privacy preserving models for a new era of the Internet of Things

JE Rivadeneira, JS Silva, R Colomo-Palacios… - Journal of Network and …, 2023 - Elsevier
New concepts based on the Internet of Things propose the integration of the human factor as
a key component of novel interconnected ecosystems, to offer them new services and …

[PDF][PDF] Positioning of UAV base stations using 5G and beyond networks for IOMT applications

TM Ghazal - 2021 - repositoriobibliotecas.uv.cl
5G and Beyond 5G networks (B5G) face the greatest obstacle to ensure accessibility with all
categories of users. A significant part of the emerging wireless networks will greatly facilitate …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things

M Tanveer, A Alkhayyat, N Kumar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the widespread utilization of Internet-enabled smart devices (SDs), the Industrial
Internet of Things (IIoT) has become prevalent in recent years. SDs exchange information …

CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

M Tanveer, A Badshah, H Alasmary, SA Chaudhry - Internet of Things, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) revolutionizes industrial production using
smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit …

A secure and anonymous user authentication scheme for IoT-enabled smart home environments using PUF

Y Cho, J Oh, D Kwon, S Son, J Lee, Y Park - IEEE Access, 2022 - ieeexplore.ieee.org
With the continuous development of Internet of Things (IoT) technology, research on smart
home environments is being conducted by many researchers. In smart home environments …

SUSIC: A secure user access control mechanism for SDN-enabled IIoT and cyber physical systems

A Irshad, GA Mallah, M Bilal… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The integration of thriving information and communications technology (ICT) and cyber–
physical systems (CPSs) has spawned several innovative applications, such as remote …

RUAM-IoD: A robust user authentication mechanism for the Internet of Drones

M Tanveer, A Alkhayyat, A Naushad, N Kumar… - IEEE …, 2022 - ieeexplore.ieee.org
The revolutionary advancement in the capabilities of hardware tools, software packages,
and communication techniques gave rise to the Internet of Things-supported drone networks …

CBACS: A privacy-preserving and efficient cache-based access control scheme for software defined vehicular networks

X Zhang, H Zhong, C Fan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In vehicular networks, caching content in fog nodes is a widely accepted and favorable way
to quickly respond to massive vehicle requests, reduce content retrieval delay and improve …