An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT

A Shahidinejad, J Abawajy - ACM Computing Surveys, 2024 - dl.acm.org
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …

A survey of IoT and blockchain integration: Security perspective

EA Shammar, AT Zahary, AA Al-Shargabi - IEEE Access, 2021 - ieeexplore.ieee.org
Blockchain has recently attracted significant academic attention in research fields beyond
the financial industry. In the Internet of Things (IoT), blockchain can be used to create a …

TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor

N Singh, AK Das - The Journal of Supercomputing, 2024 - Springer
Security vulnerabilities associated with Internet of Medical Things (IoMT) may lead to health
disasters. The researchers already have designed several lightweight authentication …

Design and development of consensus activation function enabled neural network-based smart healthcare using BIoT

I Benkhaddra, A Kumar, MA Setitra, L Hang - Wireless Personal …, 2023 - Springer
In the healthcare region, Internet of Things (IoT) plays a major role in various fields and is
developed as a common technique. An enormous amount of data is collected from various …

Securing genetic algorithm enabled SDN routing for blockchain based Internet of Things

S Abbas, N Javaid, A Almogren, SM Gulfam… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is an emerging domain in which different devices communicate with
each other through minimum human intervention. IoT devices are usually operated in hostile …

5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions

M Adil, H Song, MK Khan, A Farouk, Z Jin - Journal of Network and …, 2024 - Elsevier
Internet technology has proven to be a vital contributor to many cutting-edge innovations that
have given humans access to interact virtually with objects. Until now, numerous virtual …

Efficient and anonymous cross-domain authentication for IIoT based on blockchain

J Cui, N Liu, Q Zhang, D He, C Gu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The rapid development of the Industrial Internet of Things (IIoT) has realized the intelligence
of industrial manufacturing and improved production efficiency. For improved collaboration …

Blockchain iota sharding-based scalable secure group communication in large vanets

VS Naresh, VVLD Allavarpu… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The advent of group-oriented communication applications has triggered research on secure
group communication (SGC) in vehicular ad hoc networks (VANETs). Given this, some …

[HTML][HTML] A blockchain-centric IoT architecture for effective smart contract-based management of IoT data communications

AS Albulayhi, IS Alsukayti - Electronics, 2023 - mdpi.com
The exponential growth of the Internet of Things (IoT) is being witnessed nowadays in
different sectors. This makes IoT data communications more complex and harder to manage …