Related references
Note: Only part of the references are listed.Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model
Haotian Yin
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2023)
Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems
Haleh Amintoosi et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX
Xin Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
MoTH: Mobile Terminal Handover Security Protocol for HUB Switching Based on 5G and Beyond (5GB) P2MP Backhaul Environment
Jiyoon Kim et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices
Jin Cao et al.
IEEE INTERNET OF THINGS JOURNAL (2022)
A secure authentication scheme for IoT application in smart home
Pankaj Kumar et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)
Key Generation for Internet of Things: A Contemporary Survey
Weitao Xu et al.
ACM COMPUTING SURVEYS (2021)
Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence
Jie Zhang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial
Mohamed Amine Ferrag et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol
Michael Troncoso et al.
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)
Identification of Wearable Devices with Bluetooth
Hidayet Aksu et al.
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2021)
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network
Qi Jiang et al.
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)
A Survey of Healthcare Internet of Things (HIoT): A Clinical Perspective
Hadi Habibzadeh et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems
Jiping Li et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0
Dongkun Hou et al.
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)
Leakage-Resilient and Lightweight Authenticated Key Exchange for E-Health
Wenjun Zeng et al.
2020 THE 6TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2020) (2020)
Preserving Privacy in Mobile Health Systems Using Non-Interactive Zero-Knowledge Proof and Blockchain
Antonio Emerson Barros Tomaz et al.
IEEE ACCESS (2020)
The Future of Healthcare Internet of Things: A Survey of Emerging Technologies
Yazdan Ahmad Qadri et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare
Km Renuka et al.
JOURNAL OF MEDICAL SYSTEMS (2019)
MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems
Muhammad Yaseen et al.
JOURNAL OF MEDICAL SYSTEMS (2019)
IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices
Francesca Meneghello et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Developing a platform to evaluate and assess the security of wearable devices
Matthew L. Hale et al.
DIGITAL COMMUNICATIONS AND NETWORKS (2019)
Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review
Tehreem Yaqoob et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Survey and Systematization of Secure Device Pairing
Mikhail Fomichev et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
Personal PIN Leakage from Wearable Devices
Chen Wang et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
Ashok Kumar Das et al.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2018)
A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things
Shi-Cho Cha et al.
IEEE ACCESS (2018)
Two-Factor Authentication with End-to-End Password Security
Stanislaw Jarecki et al.
PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II (2018)
Stress Events Detection of Driver by Wearable Glove System
Dae Seok Lee et al.
IEEE SENSORS JOURNAL (2017)
Anonymous Authentication for Wireless Body Area Networks With Provable Security
Debiao He et al.
IEEE SYSTEMS JOURNAL (2017)
A Survey on Security and Privacy Issues in Internet-of-Things
Yuchen Yang et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
SecIoT: a security framework for the Internet of Things
Xin Huang et al.
SECURITY AND COMMUNICATION NETWORKS (2016)
A Secure System For Pervasive Social Network-Based Healthcare
Jie Zhang et al.
IEEE ACCESS (2016)
Secure Device Pairing: A Survey
Shahab Mirzadeh et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Formal Analysis of Secure Device Pairing Protocols
Trung Nguyen et al.
2014 IEEE 13TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA 2014) (2014)
Secure Ad Hoc Trust Initialization and Key Management in Wireless Body Area Networks
Ming Li et al.
ACM TRANSACTIONS ON SENSOR NETWORKS (2013)
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
L. H. Nguyen et al.
JOURNAL OF COMPUTER SECURITY (2011)
A New Design of Wearable Token System for Mobile Device Security
Da-Zhi Sun et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2008)