501 Hits in 5.2 sec

IoT Modes of Operations with Different Security Key Management Techniques: A Survey

Samah Mohamed, Ayman M. Hassan, Heba K. Aslan
2021 International Journal of Safety and Security Engineering  
In this paper, we present a classification of IoT modes of operation based on the distribution of IoT devices, connectivity to the internet, and the typical field of application.  ...  In the present paper, we survey different key management protocols concerning IoT, which we further allocate in a map table.  ...  The difference between them is the existence of a third party in certificate-based schemes to certify the authenticity of the user's public key.  ... 
doi:10.18280/ijsse.110604 fatcat:okvart2z3vaork4kjx7odnpxme

Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues

Norah Alsaeed, Farrukh Nadeem
2022 Applied Sciences  
Authentication of users and devices is the first layer of security in IoMT. However, because of diverse and resource-constrained devices, authentication in IoMT is a challenging task.  ...  We also established a taxonomy of authentication schemes in IoMT from seven different perspectives.  ...  Efficient, anonymous, and secure authentication in mobile three-tier healthcare with wearable medical devices Network Three-way SPAN animator software Communication computation, storage overhead ECC Asymmetric  ... 
doi:10.3390/app12157487 fatcat:bormi2zu3ferdcipjanhcydk7m

A Survey of Internet of Things (IoT) Authentication Schemes

Mohammed El-hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni
2019 Sensors  
Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system  ...  This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature.  ...  Thus, the authors of [142] proposed a novel scheme by using a three-factor authentication.  ... 
doi:10.3390/s19051141 fatcat:sc6et2p5vneyvietpdr4gr4ena

Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures [article]

Yinhao Jiang, Ba Dung Le, Tanveer Zia, Praveen Gauravaram
2022 arXiv   pre-print
devices, security of delicate data transmission, privacy in participating sensing, and identity privacy in opportunistic networks.  ...  Each of the surveyed privacy concerns is discussed in a well-defined scope according to the impacts mentioned above.  ...  In 2012, Carver and Lin utilised group-oriented broadcast encryption based on pairing and identity-based signature, and constructed an authentication scheme for OppNets based on Bluetooth and 3G communications  ... 
arXiv:2202.04313v1 fatcat:6yz6bt73wzeapadd5el6zrsvli

Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey

Vani Rajasekar, Premalatha Jayapaul, Sathya Krishnamoorthi, Muzafer Saračević
2021 Acta Polytechnica Hungarica  
Similarly, remote user authentication techniques have become essential in accelerating IoT as well. Security is a major concern in IoT because it allows secure access to remote services.  ...  Cloud computing services and a Multi-server environment share data among different end-users through the internet which also needs security as its paramount concern.  ...  [50] identified a secure safe three-factor authentication scheme for a multi-server environment. Yao et al.  ... 
doi:10.12700/aph.18.3.2021.3.5 fatcat:z6m33sofgngg3e4xr2zwfxm5ta

Security-related Research in Ubiquitous Computing -- Results of a Systematic Literature Review [article]

Ema Kušen, Mark Strembeck
2017 arXiv   pre-print
In this paper, we present results of a systematic literature review (SLR) on security-related topics in ubiquitous computing environments.  ...  However, in order to take full advantage of the numerous benefits offered by novel mobile devices and services, we must address the related security issues.  ...  Based on the IHS iSuppli's estimate, in just three years since the beginning of our study (2013) wearable fitness gadgets will increase in their shipment by 12.4 million units 1 .  ... 
arXiv:1701.00773v1 fatcat:v5fi5kelfjethmqeq5lnvdbcyy

Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks

Mengxia Shuai, Bin Liu, Nenghai Yu, Ling Xiong
2019 Security and Communication Networks  
To overcome the historical security problems, in this paper, we present a lightweight and secure three-factor authentication scheme for remote patient monitoring using oBWNs.  ...  In recent years, several authentication schemes have been proposed for remote patient monitoring.  ...  Although these public key schemes improved the security of authentication in the IoT environment, these schemes should be avoided because the asymmetric-based solutions were highly computational and had  ... 
doi:10.1155/2019/8145087 fatcat:oscjb4r6grffvalstpvpw5v2q4

Security and Privacy in the Medical Internet of Things: A Review

Wencheng Sun, Zhiping Cai, Yangyang Li, Fang Liu, Shengqun Fang, Guoyan Wang
2018 Security and Communication Networks  
The security and privacy of the data collected from MIoT devices, either during their transmission to a cloud or while stored in a cloud, are major unsolved concerns.  ...  Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people after its showing up.  ...  They developed a novel proxy signature-based protocol, based on a novel discrete log-based trapdoor hashing scheme, to enable authenticated and authorized selective sharing of patient health information  ... 
doi:10.1155/2018/5978636 fatcat:odfuofjixnf25cdi7haxinhyny

Identity privacy preserving biometric based authentication scheme for Naked healthcare environment

Tanesh Kumar, An Braeken, Madhusanka Liyanage, Mika Ylianttila
2017 2017 IEEE International Conference on Communications (ICC)  
We propose a biometric based authentication scheme for the Naked hospital environment that also protects the patients identity privacy.  ...  In addition, we show that this authentication scheme can resist various well known attacks such as insider attacks, replay attacks and identity privacy among others.  ...  based authentication scheme for the Naked hospital environment.  ... 
doi:10.1109/icc.2017.7996966 dblp:conf/icc/KumarBLY17 fatcat:h37mf33lhvcwnkguohq4odo6hi

Anonymous Authentication Protocols for IoT Based Healthcare: A Survey

Mahmoud Rajallah Asassfeh, Nadim Obeid, Wesam Almobaideen
2020 International Journal of Communication Networks and Information Security  
Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices.  ...  In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems.  ...  Das et al in [17] introduced lightweight authentication scheme which fit wearable device deployment.  ... 
dblp:journals/ijcnis/AsassfehOA20 fatcat:nmcpjm67ebftdlw4txv2ksftse

Types of Lightweight Cryptographies in Current Developments for Resource Constrained Machine Type Communication Devices: Challenges and Opportunities

Shafi Ullah, Raja Zahilah, Ilyas Khan, A. Alshehri, T.M. Yazdani
2022 IEEE Access  
This paper offers in-depth studies on different types and techniques of hardware and software-based lightweight cryptographies for machine-type communication devices in machine-to-machine communication  ...  These autonomous resource-constrained devices share sensitive data, and are primarily acquired for automation and to operate consistently in remote environments under severe conditions.  ...  network (WBAN) that provided unidentified and unlink-able variables to wearable sensor devices and achieved mutual authentication between wearable sensors devices and endnodes.  ... 
doi:10.1109/access.2022.3160000 fatcat:fub6ilfhhrhndfwtsrfugwp5nm

A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things

Manisha Malik, Maitreyee Dutta, Jorge Granjal
2019 IEEE Access  
In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things.  ...  The lack of secure links exposes data exchanged by devices to theft and attacks, with hackers already showing a keen interest in this area.  ...  In the context of the IoT, a novel ECC-based signcryption scheme (ECKSS) for MIKEY was proposed in [16] .  ... 
doi:10.1109/access.2019.2900957 fatcat:fbpg4ydg55bg5okyljo67hycqq

Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems

Hui Zhang, Yuanyuan Qian, Qi Jiang
2020 Wireless Communications and Mobile Computing  
Secondly, we propose a crossdomain three-factor authentication scheme based on the above model.  ...  Only a doctor who can present all three factors can request a legitimate ticket and use it to access the wearable devices.  ...  In the same year, a new asymmetric three-party authentication scheme for mutual authentication between wearable devices and mobile devices was proposed in [20] .  ... 
doi:10.1155/2020/8818704 fatcat:llpcgevzabhyzjryo54mz5ud4m

Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning

Victor Takashi Hayashi, Wilson Vicente Ruggiero
2022 Sensors  
We propose a scheme based on a challenge response protocol with a trusted Internet of Things (IoT) autonomous device for hands-free scenarios (i.e., with no additional user interaction), integrated with  ...  State-of-the-art schemes for trusted devices with physical unclonable functions (PUF) have complex enrollment processes.  ...  Single-factor solutions based on trusted device: UCFL is a two-phase authentication scheme that uses IoT devices from a three-layer framework to mitigate attacks, such as replay, DoS, false data injection  ... 
doi:10.3390/s22041325 pmid:35214227 pmcid:PMC8874467 fatcat:6xzkeybjmfat3lcdednt3lkj3q

Secured Key Agreement Schemes in Wireless Body Area Network — A Review

S Z Hussain, Jamia Millia Islamia, New Delhi, India, Manoj Kumar
2021 Indian Journal of Science and Technology  
and corresponding counter measures in WBAN environment.  ...  Findings: The wide coverage of the schemes in this review provides in-depth exposure to the shortcomings of the different schemes against the listed attacks which will provide a road map to the researchers  ...  ; wearable medical devices will see a sharp increase in its usage globally (2) .  ... 
doi:10.17485/ijst/v14i24.1708 fatcat:z3mqixx4grbujk6xumsgy4pphu
« Previous Showing results 1 — 15 out of 501 results