Authentication in cloud-driven IoT-based big data environment: Survey and outlook

M Wazid, AK Das, R Hussain, G Succi… - Journal of systems …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is composed of different networked objects (ie, smart
devices) which are interconnected to gather, process, refine, and exchange meaningful data …

Lightweight IoT-based authentication scheme in cloud computing circumstance

L Zhou, X Li, KH Yeh, C Su, W Chiu - Future generation computer systems, 2019 - Elsevier
Recently, authentication technologies integrated with the Internet of Things (IoT) and cloud
computing have been promptly investigated for secure data retrieval and robust access …

Rotating behind privacy: An improved lightweight authentication scheme for cloud-based IoT environment

SA Chaudhry, A Irshad, K Yahya, N Kumar… - ACM Transactions on …, 2021 - dl.acm.org
The advancements in the internet of things (IoT) require specialized security protocols to
provide unbreakable security along with computation and communication efficiencies …

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

R Amin, N Kumar, GP Biswas, R Iqbal… - Future Generation …, 2018 - Elsevier
With the widespread popularity and usage of Internet-enabled devices, Internet of things has
become one of the most popular techniques of the modern era. However, data generated …

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment

M Wazid, AK Das, V Bhat, AV Vasilakos - Journal of Network and Computer …, 2020 - Elsevier
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …

Secure authentication scheme for IoT and cloud servers

S Kalra, SK Sood - Pervasive and Mobile Computing, 2015 - Elsevier
Abstract Internet of Things (IoT) is an upcoming platform where information and
communication technology connect multiple embedded devices to the Internet for …

An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances

R Martínez-Peláez, H Toral-Cruz, JR Parra-Michel… - Sensors, 2019 - mdpi.com
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to
enhance authentication protocols to reduce attacks and security vulnerabilities which affect …

Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing

BD Deebak, ALT Fadi - Future generation computer systems, 2021 - Elsevier
Numerous application domains in practice related to target-tracking, monitoring, and
transportation have utilized the wide usage of Wireless Sensor Networks (WSN's) …

New efficient and secured authentication protocol for remote healthcare systems in cloud‐IoT

M Azrour, J Mabrouki… - Security and …, 2021 - Wiley Online Library
Recently, Internet of Things and cloud computing are known to be emerged technologies in
digital evolution. The first one is a large network used to interconnect embedded devices …

The emergence of Internet of Things (IoT): Connecting anything, anywhere

MA Rahman, AT Asyhari - Computers, 2019 - mdpi.com
Internet of Things (IoT) plays the role of an expert's technical tool by empowering physical
resources into smart entities through existing network infrastructures. Its prime focus is to …