Access control in the Internet of Things: Big challenges and new opportunities

A Ouaddah, H Mousannif, A Abou Elkalam… - Computer Networks, 2017 - Elsevier
In this paper, an extensive state of the art review of different access control solutions in IoT
within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An …

[HTML][HTML] Blockchain in healthcare and IoT: A systematic literature review

EM Adere - Array, 2022 - Elsevier
Blockchain technology is a highly regarded technology that possesses a plethora of exciting
features. This paper analyzes trends and highlights the potential benefits of blockchain …

[HTML][HTML] BBDS: Blockchain-based data sharing for electronic medical records in cloud environments

Q Xia, EB Sifah, A Smahi, S Amofa, X Zhang - Information, 2017 - mdpi.com
Disseminating medical data beyond the protected cloud of institutions poses severe risks to
patients' privacy, as breaches push them to the point where they abstain from full disclosure …

[HTML][HTML] A roadmap for security challenges in the Internet of Things

AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT)
context are playing an active role in human activities, systems and processes. The high …

[HTML][HTML] Blockchain and Internet of Things in smart cities and drug supply management: Open issues, opportunities, and future directions

H Malik, T Anees, M Faheem, MU Chaudhry, A Ali… - Internet of things, 2023 - Elsevier
Blockchain-based drug supply management (DSM) requires powerful security and privacy
procedures for high-level authentication, interoperability, and medical record sharing …

[HTML][HTML] Blockchain-based access control techniques for IoT applications

S Namane, I Ben Dhaou - Electronics, 2022 - mdpi.com
The Internet of Things is gaining more importance in the present era of Internet technology. It
is considered as one of the most important technologies of everyday life. Moreover, IoT …

[HTML][HTML] Enabling secure data transmission for wireless sensor networks based IoT applications

U Panahi, C Bayılmış - Ain Shams Engineering Journal, 2023 - Elsevier
The high volume of sensed and transferred data among nodes on wireless sensor networks
makes it necessary to keep the data safe. This study offers an improved security mechanism …

Secured fine-grained selective access to outsourced cloud data in IoT environments

Q Xia, EB Sifah, KOBO Agyekum, H Xia… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
With the vast increase in data transmission due to a large number of information collected by
devices, data management, and security has been a challenge for organizations. Many data …

Analysis on security methods of wireless sensor network (WSN)

AA Mugheri, MA Siddiqui… - Sukkur IBA Journal of …, 2018 - journal.iba-suk.edu.pk
Security has always been a major area of concern for WSN. Due to limited resources and
size constrain of a node, WSN still lacks a comprehensive security mechanism for its …

BTG-AC: Break-the-glass access control model for medical data in wireless sensor networks

HA Maw, H Xiao, B Christianson… - IEEE journal of …, 2015 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have recently attracted much interest in the research
community because of their wide range of applications. An emerging application for WSNs …