4.7 Article

An anonymous device to device access control based on secure certificate for internet of medical things systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

A clogging resistant secure authentication scheme for fog computing services

Zeeshan Ali et al.

Summary: This passage introduces fog computing infrastructure and its similarities to cloud computing in terms of privacy and security issues, as well as the SAKA-FC scheme to address these issues. It identifies vulnerabilities in SAKA-FC and proposes an improved scheme, which is validated through formal and informal security analysis to be effective, and compared in terms of costs with other schemes.

COMPUTER NETWORKS (2021)

Article Engineering, Electrical & Electronic

Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things

B. D. Deebak et al.

Summary: Technological development enhances the computational capabilities of smart devices using TMIS in healthcare organizations, improving medical identification and automating remote healthcare monitoring. The CBMH platform offers emergency treatment support and emphasizes security and patient anonymity.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

Correcting PALK: Password-based anonymous lightweight key agreement framework for smart grid

Shehzad Ashraf Chaudhry

Summary: The paper identifies flaws in the PALK authentication scheme proposed by Khan et al., specifically pointing out errors in the login and authentication phases due to superficial ECC operations and issues with the use of public keys in the presence of multiple communicating devices. A solution iPALK is proposed by the authors, which is proven to be secure and correct using formal BAN logic and ProVerif automated tool, with performance comparisons showing iPALK to be more efficient in computation and communication costs compared to PALK.

INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS (2021)

Article Computer Science, Information Systems

Rotating behind Privacy: An Improved Lightweight Authentication Scheme for Cloud-based IoT Environment

Shehzad Ashraf Chaudhry et al.

Summary: The advancements in the Internet of Things require specialized security protocols, but many current schemes have design flaws. This article analyzes a recent authentication scheme and proposes an improved solution to address the privacy and efficiency tradeoff.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2021)

Article Computer Science, Information Systems

Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks

Cong Peng et al.

Summary: This article proposes an efficient certificateless online/offline signature scheme for wireless body area networks (WBANs), demonstrating high security and performance with low computational cost. Compared to other approaches, the proposed scheme significantly reduces computational cost for offline signers (up to 89%) and supports batch verification to reduce the verifier's execution time. Additionally, the signature size of the proposed scheme is similar to conventional signature schemes.

IEEE INTERNET OF THINGS JOURNAL (2021)

Review Computer Science, Information Systems

Medical Diagnosis Using Machine Learning: A Statistical Review

Kaustubh Arun Bhavsar et al.

Summary: Research has shown the positive impact of machine learning on improving disease diagnosis, with an increasing number of academic papers in this field. Through a systematic review, analysts examined the influence of ML methods on disease diagnosis, revealing a focus on ML methods and common diseases targeted for improvement in diagnosis.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Theory & Methods

Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems

Sravani Challa et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Correcting design flaws: An improved and cloud assisted key agreement scheme in cyber physical systems

Shehzad Ashraf Chaudhry et al.

COMPUTER COMMUNICATIONS (2020)

Article Automation & Control Systems

A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTESAE in 5G Scenario

Rajakumar Arul et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Construction & Building Technology

Security and the smart city: A systematic review

Julian Laufs et al.

Sustainable Cities and Society (2020)

Article Construction & Building Technology

Data mining and machine learning methods for sustainable smart cities traffic classification: A survey

Survey Muhammad Shafiq et al.

SUSTAINABLE CITIES AND SOCIETY (2020)

Article Construction & Building Technology

Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems

B. D. Deebak

SUSTAINABLE CITIES AND SOCIETY (2020)

Article Computer Science, Information Systems

A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems

Shehzad Ashraf Chaudhry et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

A provably secure and anonymous message authentication scheme for smart grids

Xiong Li et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Article Computer Science, Information Systems

Certificate-Based Anonymous Device Access Control Scheme for IoT Environment

Saurav Malani et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Editorial Material Computer Science, Information Systems

Comments on Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Sajid Hussain et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment

Ashok Kumar Das et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An Unlinkable Authentication Scheme for Distributed IoT Application

Yousheng Zhou et al.

IEEE ACCESS (2019)

Review Computer Science, Theory & Methods

IoT security: Review, blockchain solutions, and open challenges

Minhaj Ahmad Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions

Jianbing Ni et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Construction & Building Technology

Provably secure pseudo-identity based device authentication for smart cities environment

Alavalapati Goutham Reddy et al.

SUSTAINABLE CITIES AND SOCIETY (2018)

Article Computer Science, Information Systems

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Ashok Kumar Das et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

Sravani Challa et al.

IEEE ACCESS (2017)

Review Computer Science, Information Systems

A Survey on Security and Privacy Issues in Internet-of-Things

Yuchen Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

Practical access control for sensor networks in the context of the Internet of Things

Fagen Li et al.

COMPUTER COMMUNICATIONS (2016)

Article Computer Science, Information Systems

eDAAAS: Efficient distributed anonymous authentication and access in smart homes

An Braeken et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)

Article Engineering, Electrical & Electronic

On the Security of an Enhanced Novel Access Control Protocol for Wireless Sensor Networks

Peng Zeng et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2010)

Article Computer Science, Hardware & Architecture

A novel access control protocol for secure sensor networks

Hui-Feng Huang

COMPUTER STANDARDS & INTERFACES (2009)

Article Engineering, Electrical & Electronic

Enhanced Novel Access Control Protocol over Wireless Sensor Networks

Hyun-Sung Kim et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2009)

Article Computer Science, Information Systems

Access control in wireless sensor networks

Yun Zhou et al.

AD HOC NETWORKS (2007)