L Zhou, X Li, KH Yeh, C Su, W Chiu - Future generation computer systems, 2019 - Elsevier
Recently, authentication technologies integrated with the Internet of Things (IoT) and cloud computing have been promptly investigated for secure data retrieval and robust access …
The advancements in the internet of things (IoT) require specialized security protocols to provide unbreakable security along with computation and communication efficiencies …
With the widespread popularity and usage of Internet-enabled devices, Internet of things has become one of the most popular techniques of the modern era. However, data generated …
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
S Kalra, SK Sood - Pervasive and Mobile Computing, 2015 - Elsevier
Abstract Internet of Things (IoT) is an upcoming platform where information and communication technology connect multiple embedded devices to the Internet for …
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect …
Numerous application domains in practice related to target-tracking, monitoring, and transportation have utilized the wide usage of Wireless Sensor Networks (WSN's) …
Recently, Internet of Things and cloud computing are known to be emerged technologies in digital evolution. The first one is a large network used to interconnect embedded devices …
Internet of Things (IoT) plays the role of an expert's technical tool by empowering physical resources into smart entities through existing network infrastructures. Its prime focus is to …