Sensors for context-aware smart healthcare: A security perspective

E Batista, MA Moncusi, P López-Aguilar… - Sensors, 2021 - mdpi.com
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …

Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …

[PDF][PDF] DSQLR-A distributed scheduling and QoS localized routing scheme for wireless sensor network

J Jasmine, N Yuvaraj… - Recent trends in …, 2022 - researchgate.net
(WSNs) in critical monitoring applications. Such applications are characterized by
considerable network load generated as a result of sensing some characteristics of the …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Toward a secure industrial wireless body area network focusing MAC layer protocols: an analytical review

A Javadpour, AK Sangaiah, F Ja'Fari… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Monitoring security and quality of service is essential, due to the rapid growth of the number
of nodes in wireless networks. In healthcare/industrial environments, especially in wireless …

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

C Wang, D Wang, G Xu, D He - Science China Information Sciences, 2022 - Springer
Abstract Industry 4.0, which combines information technology, network and industrial
production, is expected to have a tremendous impact on our daily lives. In such a complex …

Intelligent Intrusion Detection Based on Federated Learning for Edge‐Assisted Internet of Things

D Man, F Zeng, W Yang, M Yu, J Lv… - Security and …, 2021 - Wiley Online Library
As an innovative strategy, edge computing has been considered a viable option to address
the limitations of cloud computing in supporting the Internet‐of‐Things applications …

Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

A robust two-factor user authentication scheme-based ECC for smart home in IoT

S Zou, Q Cao, C Wang, Z Huang, G Xu - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
The unprecedented proliferation of smart home together with wireless sensor networks has
enriched human's daily life. Inevitably, the smart home without the guard of authentication …

Edge-Assisted Intelligent Device Authentication in Cyber–Physical Systems

Y Lu, D Wang, MS Obaidat… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Cyber–physical system (CPS) provides a foundation for the Industrial Internet of Things
(IIoT) that interconnects all types of devices. The integration of CPS with IIoT generates the …