Ara
Toplam kayıt 5, listelenen: 1-5
Security and Key Management in IoT Based Wireless Sensor Networks: An Authentication Protocol Using Symmetric Key
(WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ USA, 2019)
Wireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things ...
ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment
(SPRINGER HEIDELBERG, TIERGARTENSTRASSE 17, D-69121 HEIDELBERG, GERMANY, 2020)
In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739-8752, 2019; 10.1109/JIOT.2019.2931372) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session key between a ...
Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141 USA, 2020)
The significance of the Internet of Drones (IoD) is increasing steadily and now IoD is being practiced in many military and civilian-based applications. IoD facilitates real-time data access to the users especially the ...
A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2022)
With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major
vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between ...
A low-cost privacy preserving user access in mobile edge computing framework
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2022)
The computational offloading from conventional cloud datacenter towards edge devices sprouted
a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in ...