A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
IoT Modes of Operations with Different Security Key Management Techniques: A Survey
2021
International Journal of Safety and Security Engineering
In this paper, we present a classification of IoT modes of operation based on the distribution of IoT devices, connectivity to the internet, and the typical field of application. ...
In the present paper, we survey different key management protocols concerning IoT, which we further allocate in a map table. ...
The difference between them is the existence of a third party in certificate-based schemes to certify the authenticity of the user's public key. ...
doi:10.18280/ijsse.110604
fatcat:okvart2z3vaork4kjx7odnpxme
Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues
2022
Applied Sciences
Authentication of users and devices is the first layer of security in IoMT. However, because of diverse and resource-constrained devices, authentication in IoMT is a challenging task. ...
We also established a taxonomy of authentication schemes in IoMT from seven different perspectives. ...
Efficient, anonymous, and secure authentication in mobile three-tier healthcare with wearable medical devices Network Three-way SPAN animator software Communication computation, storage overhead ECC Asymmetric ...
doi:10.3390/app12157487
fatcat:bormi2zu3ferdcipjanhcydk7m
A Survey of Internet of Things (IoT) Authentication Schemes
2019
Sensors
Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system ...
This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. ...
Thus, the authors of [142] proposed a novel scheme by using a three-factor authentication. ...
doi:10.3390/s19051141
fatcat:sc6et2p5vneyvietpdr4gr4ena
Privacy Concerns Raised by Pervasive User Data Collection From Cyberspace and Their Countermeasures
[article]
2022
arXiv
pre-print
devices, security of delicate data transmission, privacy in participating sensing, and identity privacy in opportunistic networks. ...
Each of the surveyed privacy concerns is discussed in a well-defined scope according to the impacts mentioned above. ...
In 2012, Carver and Lin utilised group-oriented broadcast encryption based on pairing and identity-based signature, and constructed an authentication scheme for OppNets based on Bluetooth and 3G communications ...
arXiv:2202.04313v1
fatcat:6yz6bt73wzeapadd5el6zrsvli
Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey
2021
Acta Polytechnica Hungarica
Similarly, remote user authentication techniques have become essential in accelerating IoT as well. Security is a major concern in IoT because it allows secure access to remote services. ...
Cloud computing services and a Multi-server environment share data among different end-users through the internet which also needs security as its paramount concern. ...
[50] identified a secure safe three-factor authentication scheme for a multi-server environment. Yao et al. ...
doi:10.12700/aph.18.3.2021.3.5
fatcat:z6m33sofgngg3e4xr2zwfxm5ta
Security-related Research in Ubiquitous Computing -- Results of a Systematic Literature Review
[article]
2017
arXiv
pre-print
In this paper, we present results of a systematic literature review (SLR) on security-related topics in ubiquitous computing environments. ...
However, in order to take full advantage of the numerous benefits offered by novel mobile devices and services, we must address the related security issues. ...
Based on the IHS iSuppli's estimate, in just three years since the beginning of our study (2013) wearable fitness gadgets will increase in their shipment by 12.4 million units 1 . ...
arXiv:1701.00773v1
fatcat:v5fi5kelfjethmqeq5lnvdbcyy
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks
2019
Security and Communication Networks
To overcome the historical security problems, in this paper, we present a lightweight and secure three-factor authentication scheme for remote patient monitoring using oBWNs. ...
In recent years, several authentication schemes have been proposed for remote patient monitoring. ...
Although these public key schemes improved the security of authentication in the IoT environment, these schemes should be avoided because the asymmetric-based solutions were highly computational and had ...
doi:10.1155/2019/8145087
fatcat:oscjb4r6grffvalstpvpw5v2q4
Security and Privacy in the Medical Internet of Things: A Review
2018
Security and Communication Networks
The security and privacy of the data collected from MIoT devices, either during their transmission to a cloud or while stored in a cloud, are major unsolved concerns. ...
Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people after its showing up. ...
They developed a novel proxy signature-based protocol, based on a novel discrete log-based trapdoor hashing scheme, to enable authenticated and authorized selective sharing of patient health information ...
doi:10.1155/2018/5978636
fatcat:odfuofjixnf25cdi7haxinhyny
Identity privacy preserving biometric based authentication scheme for Naked healthcare environment
2017
2017 IEEE International Conference on Communications (ICC)
We propose a biometric based authentication scheme for the Naked hospital environment that also protects the patients identity privacy. ...
In addition, we show that this authentication scheme can resist various well known attacks such as insider attacks, replay attacks and identity privacy among others. ...
based authentication scheme for the Naked hospital environment. ...
doi:10.1109/icc.2017.7996966
dblp:conf/icc/KumarBLY17
fatcat:h37mf33lhvcwnkguohq4odo6hi
Anonymous Authentication Protocols for IoT Based Healthcare: A Survey
2020
International Journal of Communication Networks and Information Security
Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices. ...
In this paper we present a review of the most relevant techniques that address the security in general and Anonymous Authentication particularly in the context of healthcare systems. ...
Das et al in [17] introduced lightweight authentication scheme which fit wearable device deployment. ...
dblp:journals/ijcnis/AsassfehOA20
fatcat:nmcpjm67ebftdlw4txv2ksftse
Types of Lightweight Cryptographies in Current Developments for Resource Constrained Machine Type Communication Devices: Challenges and Opportunities
2022
IEEE Access
This paper offers in-depth studies on different types and techniques of hardware and software-based lightweight cryptographies for machine-type communication devices in machine-to-machine communication ...
These autonomous resource-constrained devices share sensitive data, and are primarily acquired for automation and to operate consistently in remote environments under severe conditions. ...
network (WBAN) that provided unidentified and unlink-able variables to wearable sensor devices and achieved mutual authentication between wearable sensors devices and endnodes. ...
doi:10.1109/access.2022.3160000
fatcat:fub6ilfhhrhndfwtsrfugwp5nm
A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things
2019
IEEE Access
In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things. ...
The lack of secure links exposes data exchanged by devices to theft and attacks, with hackers already showing a keen interest in this area. ...
In the context of the IoT, a novel ECC-based signcryption scheme (ECKSS) for MIKEY was proposed in [16] . ...
doi:10.1109/access.2019.2900957
fatcat:fbpg4ydg55bg5okyljo67hycqq
Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems
2020
Wireless Communications and Mobile Computing
Secondly, we propose a crossdomain three-factor authentication scheme based on the above model. ...
Only a doctor who can present all three factors can request a legitimate ticket and use it to access the wearable devices. ...
In the same year, a new asymmetric three-party authentication scheme for mutual authentication between wearable devices and mobile devices was proposed in [20] . ...
doi:10.1155/2020/8818704
fatcat:llpcgevzabhyzjryo54mz5ud4m
Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning
2022
Sensors
We propose a scheme based on a challenge response protocol with a trusted Internet of Things (IoT) autonomous device for hands-free scenarios (i.e., with no additional user interaction), integrated with ...
State-of-the-art schemes for trusted devices with physical unclonable functions (PUF) have complex enrollment processes. ...
Single-factor solutions based on trusted device: UCFL is a two-phase authentication scheme that uses IoT devices from a three-layer framework to mitigate attacks, such as replay, DoS, false data injection ...
doi:10.3390/s22041325
pmid:35214227
pmcid:PMC8874467
fatcat:6xzkeybjmfat3lcdednt3lkj3q
Secured Key Agreement Schemes in Wireless Body Area Network — A Review
2021
Indian Journal of Science and Technology
and corresponding counter measures in WBAN environment. ...
Findings: The wide coverage of the schemes in this review provides in-depth exposure to the shortcomings of the different schemes against the listed attacks which will provide a road map to the researchers ...
; wearable medical devices will see a sharp increase in its usage globally (2) . ...
doi:10.17485/ijst/v14i24.1708
fatcat:z3mqixx4grbujk6xumsgy4pphu
« Previous
Showing results 1 — 15 out of 501 results