To see the other types of publications on this topic, follow the link: Device sharing authentication.

Journal articles on the topic 'Device sharing authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Device sharing authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

P, Prabu, and Senthilnathan T. "Secured and flexible user authentication protocol for wireless sensor network." International Journal of Intelligent Unmanned Systems 8, no. 4 (2020): 253–65. http://dx.doi.org/10.1108/ijius-10-2019-0058.

Full text
Abstract:
PurposeIn wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.Design/methodology/approachIn previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.FindingsHere, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Pr
APA, Harvard, Vancouver, ISO, and other styles
2

Kunal Gautam and Mohammad Yusuf Ali. "Blockchain-based storage system for secure document storage and sharing." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 1486–97. https://doi.org/10.30574/wjaets.2025.15.3.1071.

Full text
Abstract:
The rapid expansion platforms have heightened urgency for robust authentication to protect sensitive from escalating array cyber threats. Traditional security systems increasingly insufficient, as they vulnerable to attack, including phishing brute-force attempts. In response these challenges, two-factor (2FA) has emerged as critical solution, requiring users to provide forms verification access accounts. However, many 2FA implementations significant flaws, such as inadequate end-to-end and poor synchronization, which can expose security risks. This study an open-source, fully encrypted 2FA de
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, Jun, Xinhui Cao, and Zhen Guo. "Secure Marine Environment Communication: A Multiobject Authentication Protocol Based on Secret Sharing." International Journal of Intelligent Systems 2023 (February 22, 2023): 1–14. http://dx.doi.org/10.1155/2023/1814053.

Full text
Abstract:
In the field of marine communication, with the rapid development of the Internet of Things, big data, blockchain, and other new-generation information technology, marine information security is gradually being attached to more and more coastal countries, and marine information technology has ushered in epoch-making development opportunities. However, marine communication networks are open, and marine equipment is vulnerable to attacks on communication systems. On the one hand, a malicious adversary can intercept and analyze information, obtain relevant data with high probability, and even obta
APA, Harvard, Vancouver, ISO, and other styles
4

Lopes, Ana Paula G., and Paulo R. L. Gondim. "Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation." Wireless Communications and Mobile Computing 2020 (October 27, 2020): 1–16. http://dx.doi.org/10.1155/2020/8876807.

Full text
Abstract:
Relay-assisted device-to-device (D2D) communication serves users at the edge of system coverage of 5G networks, enabling communication among sensors and patients’ mobile devices, and improving spectral and power efficiency. The security of D2D-based m-health applications requires attention due to the delicacy of the data treated in the collection, transmission, and storage of information on patients, whose devices must be adequately authenticated. However, traditional authentication and key agreement schemes are not suitable for D2D scenarios, since they might expose patients to security vulne
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Li, Ching-Chun Chang, Junlan Bai, Hai-Duong Le, Chi-Cheng Chen, and Teen-Hang Meen. "Hamming Code Strategy for Medical Image Sharing." Applied System Innovation 3, no. 1 (2020): 8. http://dx.doi.org/10.3390/asi3010008.

Full text
Abstract:
In medical practice, the scanned image of the patient between the patient and the doctor is confidential. If info is stored on a single server and the server is successfully attacked, it is possible to expose confidential information. Password encryption and data authentication are commonly used to protect patient data, however, encryption and data authentication are computationally expensive and take time to execute on a mobile device. In addition, it is not easy for the patient details related to medical images to leak if the hacked image are not visual.Therefore, in this paper, we propose a
APA, Harvard, Vancouver, ISO, and other styles
6

Saurabh. "Security Enhancement for IoT using Mutual Authentication Based Lightweight Algorithm." Advances in Nonlinear Variational Inequalities 28, no. 1s (2024): 479–505. https://doi.org/10.52783/anvi.v28.2448.

Full text
Abstract:
Internet of Things (IoT) has revolutionized communication technology by enabling seamless data exchange between devices. As the proliferation of sensors and smart devices grows, IoT services become increasingly accessible, impacting our lives in diverse areas such as homes, offices, agriculture, and healthcare. However, the widespread adoption of IoT also raises critical concerns regarding data security, device privacy, and the integrity of underlying infrastructure. To address these challenges, robust authentication mechanisms are essential. Mutual authentication between IoT devices establish
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Dae-Hwi, and Im-Yeong Lee. "Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments." Sensors 18, no. 10 (2018): 3534. http://dx.doi.org/10.3390/s18103534.

Full text
Abstract:
The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, improving living conditions. Smart homes were among the first developments, and smart buildings, smart factories, and smart cities are attracting increasing attention. Smart cities represent the ultimate convergence of the IoT, the Cloud, big data, and mobile technology. Smart homes, buildings, and factories create smart cities. In addition, the IoT finds applications in traffic control, public safety, and medical services, permitting group-based communication. As the scale of service grows, the nu
APA, Harvard, Vancouver, ISO, and other styles
8

Meng, Yifan, and Jingzhao Li. "Data Sharing Mechanism of Sensors and Actuators of Industrial IoT Based on Blockchain-Assisted Identity-Based Cryptography." Sensors 21, no. 18 (2021): 6084. http://dx.doi.org/10.3390/s21186084.

Full text
Abstract:
The Industrial IoT is one of the key technologies to improve industrial production efficiency. The entire production process usually involves multiple production regions and numerous smart devices (sensors and actuators). The efficiency of the Industrial IoT is limited by this strong coupling relationship between the subsystem and the sensors and actuators. In this paper, to unleash the potential of Industrial IoT, a safe and reliable data sharing mechanism of sensors and actuators is proposed. We deployed distributed identity authentication and data proxy services in various regions. In the d
APA, Harvard, Vancouver, ISO, and other styles
9

Amit, Gupta, and Arora Gaurav. "Location-based access to shared devices." Journal of Scientific and Engineering Research 8, no. 2 (2021): 274–77. https://doi.org/10.5281/zenodo.11487233.

Full text
Abstract:
In the era of digitalization, businesses seek new methods to improve security without sacrificing user experience, which has led to the use of multi-authentication in mobile applications. However, incorporating location-based authentication into mobile apps presents hurdles, particularly for large enterprises in various operating contexts. The key difficulty is the large size of machine learning (ML) models necessary for authentication, which makes over-the-air (OTA) downloads impractical owing to bandwidth and storage limitations. Furthermore, real-time authentication may fail in instances in
APA, Harvard, Vancouver, ISO, and other styles
10

Edris, Ed Kamya Kiyemba, Mahdi Aiash, and Jonathan Loo. "Formal Verification of Authentication and Service Authorization Protocols in 5G-Enabled Device-to-Device Communications Using ProVerif." Electronics 10, no. 13 (2021): 1608. http://dx.doi.org/10.3390/electronics10131608.

Full text
Abstract:
Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture
APA, Harvard, Vancouver, ISO, and other styles
11

I., Venkata Dwaraka Srihith. "Federated Frameworks: Pioneering Secure and Decentralized Authentication Systems." Journal of Advances in Computational Intelligence Theory 7, no. 1 (2024): 31–40. https://doi.org/10.5281/zenodo.13968684.

Full text
Abstract:
<em>Federated Learning (FL) is innovative machine learning approach that lets multiple devices work together to train models without sharing sensitive data. By keeping data on the device, FL not only boosts privacy and security but also helps improve models collectively. Recent research looked into how Blockchain technology could strengthen FL, tackling existing security issues. Blockchain adds a safeguard against threats like data tampering or unauthorized access and makes systems more transparent and fairer by improving how records and rewards are managed. By blending Blockchain with FL, we
APA, Harvard, Vancouver, ISO, and other styles
12

Ul Islam, Atowar, Samarjit Das, Aniruddha Deka, Chinmoy Bharadwaj, and Priyanka Sarma. "A BlockChain-Based IoT Data Securing and Sharing System for Attendance Management." Indian Journal Of Science And Technology 17, no. 23 (2024): 2430–43. http://dx.doi.org/10.17485/ijst/v17i23.1981.

Full text
Abstract:
Objective: An Internet of Things (IoT) network has constraints on power consumption, processing power and security of end devices in the network. On the other hand, blockchain technology has some difficulties in storage capacity, data privacy, the ability to revoke consent, energy usage, scalability, and speed. To overcome the individual limitations of these two technologies, we integrate these two to propose a new design with an intention to authenticate, secure and share data pertaining to attendance system. In this present work the primary implementation details of our proposed work regardi
APA, Harvard, Vancouver, ISO, and other styles
13

Shanker, Ravi, Dr Sahil Verma, and Dr Kavita. "Analysis of information security service for internet application." International Journal of Engineering & Technology 7, no. 4.12 (2018): 58. http://dx.doi.org/10.14419/ijet.v7i4.12.20993.

Full text
Abstract:
Background/Objectives: With the proliferation of online platforms, information is generated every second, and there is an urgent need to firstly store the huge amount of data and secondly to secure that data. The level of sophistication is increasing day by day, so alongside the demand for excessive computational power and resources also hikes up. With the advancements in technology and with the concepts like globalization coming into picture, people find the need of sharing information important. Methods/Statistical Analysis: Information security aspects are analyzed based on confidentiality,
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Dong, Xiaosong Zhang, Jiang Ming, Ting Chen, Chao Wang, and Weina Niu. "Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device." Wireless Communications and Mobile Computing 2018 (July 4, 2018): 1–15. http://dx.doi.org/10.1155/2018/7849065.

Full text
Abstract:
Firmware vulnerability is an important target for IoT attacks, but it is challenging, because firmware may be publicly unavailable or encrypted with an unknown key. We present in this paper an attack on Short Message Service (SMS for short) authentication code which aims at gaining the control of IoT devices without firmware analysis. The key idea is based on the observation that IoT device usually has an official application (app for short) used to control itself. Customer needs to register an account before using this app, phone numbers are usually suggested to be the account name, and most
APA, Harvard, Vancouver, ISO, and other styles
15

Corthis, P. Britto, G. P. Ramesh, Miguel García-Torres, and Roberto Ruíz. "Effective Identification and Authentication of Healthcare IoT Using Fog Computing with Hybrid Cryptographic Algorithm." Symmetry 16, no. 6 (2024): 726. http://dx.doi.org/10.3390/sym16060726.

Full text
Abstract:
Currently, Internet of Things (IoT)-based cloud systems face several problems such as privacy leakage, failure in centralized operation, managing IoT devices, and malicious attacks. The data transmission between the cloud and healthcare IoT needs trust and secure transmission of Electronic Health Records (EHRs). IoT-enabled healthcare equipment is seen in hospitals that have been implementing the technology for many years. Nonetheless, medical agencies fail to consider the security risk associated with healthcare IoT devices, which are readily compromised and cause potential threats to authent
APA, Harvard, Vancouver, ISO, and other styles
16

Chan Suet Yan, Sharon, Alice Tang Su Wei, Jie Hui Bong, et al. "Authentication of IoT device with the enhancement of One-time Password (OTP)." Journal of IT in Asia 9, no. 1 (2021): 29–40. http://dx.doi.org/10.33736/jita.3841.2021.

Full text
Abstract:
The Robust and Energy Efficient Authentication Protocol works for Industrial Internet of Things. The Internet of Things (IoT) is an arising innovation and expected to give answers for different modern fields. The IoT enable connection of physical devices all around the world to the internet by collecting and sharing critical and real-time data among each other. The increment of devices increases the computational cost during data transmission between devices and towards the internet. In this paper we proposed a solution that is a multi-factor authentication protocol to enhance the protocol pro
APA, Harvard, Vancouver, ISO, and other styles
17

Jia, Xudong, Ning Hu, Shen Su, et al. "IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things." Electronics 9, no. 4 (2020): 634. http://dx.doi.org/10.3390/electronics9040634.

Full text
Abstract:
The incredible development of Internet of things technology promotes the integration of application systems, which enable people to enjoy the convenience of multiple application services through a single intelligent device or terminal. In order to implement value exchange and information sharing between different applications, cross-domain access is inevitable. In order to prevent illegal access, identity authentication is necessary before the terminal accesses the service. Because of the need to introduce a trusted third party, the traditional centralized authentication model not only destroy
APA, Harvard, Vancouver, ISO, and other styles
18

Müller-Maatsch, Judith, and Saskia M. van Ruth. "Handheld Devices for Food Authentication and Their Applications: A Review." Foods 10, no. 12 (2021): 2901. http://dx.doi.org/10.3390/foods10122901.

Full text
Abstract:
This review summarises miniaturised technologies, commercially available devices, and device applications for food authentication or measurement of features that could potentially be used for authentication. We first focus on the handheld technologies and their generic characteristics: (1) technology types available, (2) their design and mode of operation, and (3) data handling and output systems. Subsequently, applications are reviewed according to commodity type for products of animal and plant origin. The 150 applications of commercial, handheld devices involve a large variety of technologi
APA, Harvard, Vancouver, ISO, and other styles
19

Xia, Yandong, Rongxin Qi, Sai Ji, Jian Shen, Tiantian Miao, and Huaqun Wang. "PUF-Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home." Wireless Communications and Mobile Computing 2022 (March 24, 2022): 1–15. http://dx.doi.org/10.1155/2022/8865158.

Full text
Abstract:
Various IoT-based applications such as smart home, intelligent medical, and VANETs have been put into practical utilization. The smart home is one of the most concerned environments, allowing users to access and control smart devices via the public network remotely. The smart home can provide many intelligent services for users through these smart devices. To securely access devices and obtain collected data over the public network, multifactor authentication protocols for smart home have gained wide attention. However, most of these protocols cannot withstand impersonation attack, smart devic
APA, Harvard, Vancouver, ISO, and other styles
20

Jiang, Jiahui, Tingrui Pei, Jiahao Chen, and Zhiwen Hou. "CDAS: A Secure Cross-Domain Data Sharing Scheme Based on Blockchain." Information 16, no. 5 (2025): 394. https://doi.org/10.3390/info16050394.

Full text
Abstract:
In the current context of the wide application of Internet of Things (IoT) technology, cross-domain data sharing based on industrial IoT (IIoT) has become the key to maximizing data value, but it also faces many challenges. In response to the security and privacy issues in cross-domain data sharing, we proposed a cross-domain secure data sharing scheme (CDAS) based on multiple blockchains. The scheme first designs the cross-domain blockchain in layers and assists the device in completing the data sharing on the chain through the blockchain layer close to the edge device. In addition, we combin
APA, Harvard, Vancouver, ISO, and other styles
21

Atowar, Ul Islam, Das Samarjit, Deka Aniruddha, Bharadwaj Chinmoy, and Sarma Priyanka. "A BlockChain-Based IoT Data Securing and Sharing System for Attendance Management." Indian Journal of Science and Technology 17, no. 23 (2024): 2430–43. https://doi.org/10.17485/IJST/v17i23.1981.

Full text
Abstract:
Abstract <strong>Objective:</strong>&nbsp;An Internet of Things (IoT) network has constraints on power consumption, processing power and security of end devices in the network. On the other hand, blockchain technology has some difficulties in storage capacity, data privacy, the ability to revoke consent, energy usage, scalability, and speed. To overcome the individual limitations of these two technologies, we integrate these two to propose a new design with an intention to authenticate, secure and share data pertaining to attendance system. In this present work the primary implementation detai
APA, Harvard, Vancouver, ISO, and other styles
22

Ali, Fasila, and Sheena Mathew. "An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata." PeerJ Computer Science 8 (May 25, 2022): e989. http://dx.doi.org/10.7717/peerj-cs.989.

Full text
Abstract:
The tremendous increase in the use of Internet of Things (IoT) has made an impact worldwide by changing the mode of day-to-day life. Like any other application, IoT based networks also have to be protected since the data produced consist of sensitive information. Existing algorithms for providing security in such networks do not consider all the security objectives. Starting from the sensing of data from IoT environment, the data have to be protected from several types of attacks. Also, the authentication of involved entities, integrity of data, access control and confidentiality are to be ach
APA, Harvard, Vancouver, ISO, and other styles
23

Khalid, Haqi, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim, and Muhammad Akmal Chaudhary. "A New Hybrid Online and Offline Multi-Factor Cross-Domain Authentication Method for IoT Applications in the Automotive Industry." Energies 14, no. 21 (2021): 7437. http://dx.doi.org/10.3390/en14217437.

Full text
Abstract:
Connected vehicles have emerged as the latest revolution in the automotive industry, utilizing the advent of the Internet of Things (IoT). However, most IoT-connected cars mechanisms currently depend on available network services and need continuous network connections to allow users to connect to their vehicles. Nevertheless, the connectivity availability shortcoming in remote or rural areas with no network coverage makes vehicle sharing or any IoT-connected device problematic and undesirable. Furthermore, IoT-connected cars are vulnerable to various passive and active attacks (e.g., replay a
APA, Harvard, Vancouver, ISO, and other styles
24

Yadav, Mainejar, and Ranvijay . "Emerging Trends in Visual Secret Sharing." International Journal of Engineering & Technology 7, no. 3.12 (2018): 374. http://dx.doi.org/10.14419/ijet.v7i3.12.16110.

Full text
Abstract:
Visual Secret Sharing (VSS) is an increased applicability of traditional secret sharing. In VSS, the secret information is recovered by human visual system or lightweight computational device. There are two models available in VSS, one is Visual Cryptography (VC) which is introduced by Naor's in 1994 and other is a Random Grid (RG) based VSS which is proposed by Keren and Kafri. This state of the art covers both the models of VSS along with its application. The various application areas of VSS are visual authentication and identification, image encryption, access control, data hiding etc. The
APA, Harvard, Vancouver, ISO, and other styles
25

R.Kennady, Et al. "Reliable Techniques for Providing Secure Access Control for Cloud Storage on Mobile Devices." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 3 (2023): 354–57. http://dx.doi.org/10.17762/ijritcc.v11i3.9868.

Full text
Abstract:
This research focuses on the development of a credible access control method for mobile device cloud storage. The proposed method involves a six-step process, including user registration and login, key generation, data encryption and upload, authentication theory between mobile devices, and data download and decryption. The method incorporates the use of mobile TPM (Trusted Platform Module) chips to ensure trust chain transmission during key exchange. Additionally, encryption based on elliptic curve cryptography is employed to reduce the key length and facilitate secure key sharing among multi
APA, Harvard, Vancouver, ISO, and other styles
26

Et. al., Rohit Chawla,. "Study of Security Threats and Challenges in Internet of Things Systems." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 1154–66. http://dx.doi.org/10.17762/turcomat.v12i2.1137.

Full text
Abstract:
The interpretability and secured communication are major challenge in internet of things. The embedding of wireless device has low energy and bandwidth. The low energy and bandwidth cannot effort computational overhead and compromised with security threats. Primary the conventional cryptography algorithm is applied for generation and sharing of key for mode of communication. The conventional cryptography algorithms have several bottleneck issues related to generation of key and distribution of key. The NIST models provides the secured communication channel in the environments of mobility. Lack
APA, Harvard, Vancouver, ISO, and other styles
27

Alaverdyan, Yeghisabet, Suren Poghosyan, and Vahagn Poghosyans. "Confidential Computing in Edge- Cloud Hierarchy." International Journal of Computer Science and Information Technology 15, no. 03 (2023): 21–30. http://dx.doi.org/10.5121/ijcsit.2023.15302.

Full text
Abstract:
The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified thr
APA, Harvard, Vancouver, ISO, and other styles
28

Mahalat, Mahabub Hasan, Dipankar Karmakar, Anindan Mondal, and Bibhash Sen. "PUF based Secure and Lightweight Authentication and Key-Sharing Scheme for Wireless Sensor Network." ACM Journal on Emerging Technologies in Computing Systems 18, no. 1 (2022): 1–23. http://dx.doi.org/10.1145/3466682.

Full text
Abstract:
The deployment of wireless sensor networks (WSN) in an untended environment and the openness of the wireless channel bring various security threats to WSN. The resource limitations of the sensor nodes make the conventional security systems less attractive for WSN. Moreover, conventional cryptography alone cannot ensure the desired security against the physical attacks on sensor nodes. Physically unclonable function (PUF) is an emerging hardware security primitive that provides low-cost hardware security exploiting the unique inherent randomness of a device. In this article, we have proposed an
APA, Harvard, Vancouver, ISO, and other styles
29

A.Karunamurthy,, Dr. "LOCATION- BASED SECURITY FOR PREVENTING DATA EXPOSURE IN CORPORATE ENVIRNOMENT." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem49363.

Full text
Abstract:
ABSTRACT: In today’s increasingly connected world, secure data sharing and access have become essential for businesses and organizations. With the advent of remote working and mobile access to resources, employees expect seamless access to documents, emails, and collaboration platforms from various devices and locations, often across different networks. However, accessing critical data from untrusted networks presents significant security risks, including potential data loss and unauthorized exposure of sensitive information. To address these challenges, traditional logical security mechanisms
APA, Harvard, Vancouver, ISO, and other styles
30

Jolin, J. S., A. Theophilus, and A. Kathirvel. "Two-factor Mutual Authentication with Fingerprint and MAC Address Validation." International Journal of Computer Network and Information Security 16, no. 6 (2024): 56–68. https://doi.org/10.5815/ijcnis.2024.06.05.

Full text
Abstract:
Mobile Ad hoc NETworks (MANET), unlike typical wireless networks, may be used spontaneously without the need for centralized management or network environment. Mobile nodes act as mediators to help multi-hop communications in such networks, and most instances, they are responsible for all connectivity tasks. MANET is a challenging endeavor because these systems can be attacked, which can harm the network. As a result, security concerns become a primary factor for these types of networks. This article aims to present an efficient two-factor smart card-based passcode authentication technique for
APA, Harvard, Vancouver, ISO, and other styles
31

Lyu, Sicong. "Analysis on issues and challenges of IoT and the solution based on blockchain technology." Applied and Computational Engineering 4, no. 1 (2023): 272–78. http://dx.doi.org/10.54254/2755-2721/4/20230470.

Full text
Abstract:
With the development of science and technology, the Internet of Things (IoT) has become an area of great influence and potential. However, the deficient data security and privacy problems of the current IoT systems seriously limit its application. This is due to the fact that the information exchange and data authentication in IoT must be done through the central server. In order to solve the fraud possibility of device, false authentication, unreliable data sharing, eliminating the concept of a central server, the block chain (BC) technology was adopted as part of the Internet of things used
APA, Harvard, Vancouver, ISO, and other styles
32

Azhar, Maytham, and Amin H. Seno. "A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment." Engineering and Technology Journal 37, no. 5A (2021): 172–80. http://dx.doi.org/10.30684/etj.37.5a.4.

Full text
Abstract:
In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized in medical and everyday environments. With the promise of IoT's proactive systems, the integration of smart things into standard Internet creates several security challenges, because most Internet technologies, communication protocols and sensors are not designed to support IoT. Recent research studies have shown that launching security / privacy attacks against IoT active systems, in particular, Wearable Medical S
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Lulu, Huan Qu, Huaizhen Wang, et al. "A Blockchain-Based Product Traceability System with Off-Chain EPCIS and IoT Device Authentication." Sensors 22, no. 22 (2022): 8680. http://dx.doi.org/10.3390/s22228680.

Full text
Abstract:
Blockchain-based traceability systems are a promising approach because they are decentralized, transparent, and tamper proof; however, if all traceability data are uploaded to a blockchain platform, it may affect the efficiency or even lead to data explosion. Additionally, it is difficult to guarantee the reliability of the original data source of massive Internet of Things (IoT) devices. Furthermore, when different enterprise nodes adopt different data storage structures, the costs that are associated with data sharing will increase. In this paper, we have proposed a trustworthy product trace
APA, Harvard, Vancouver, ISO, and other styles
34

Alghamdi, Ahmed Mohammed. "Design and analysis of lightweight and robust authentication protocol for securing the resource constrained IIoT environment." PLOS ONE 20, no. 2 (2025): e0318064. https://doi.org/10.1371/journal.pone.0318064.

Full text
Abstract:
The Internet of Things (IoT) is a vast network of devices, sensors, wearables, or any other object capable of processing, storing, sending, and receiving data over an open network channel. This versatility gives IoT numerous applications, one of them being in the industry, also known as the Industrial Internet of Things (IIoT). As IIoT relies on an open network channel for data sharing, it is vulnerable to numerous threats, including side channels, impersonation attacks, and clock synchronization issues for which device authentication becomes crucial. Researchers occasionally proposed numerous
APA, Harvard, Vancouver, ISO, and other styles
35

S., Velmurugan, Prakash M., Neelakandan S., and Eric Ofori Martinson. "An Efficient Secure Sharing of Electronic Health Records Using IoT-Based Hyperledger Blockchain." International Journal of Intelligent Systems 2024 (March 22, 2024): 1–16. http://dx.doi.org/10.1155/2024/6995202.

Full text
Abstract:
Electronic Health Record (EHR) systems are a valuable and effective tool for exchanging medical information about patients between hospitals and other significant healthcare sector stakeholders in order to improve patient diagnosis and treatment around the world. Nevertheless, the majority of the hospital infrastructures that are now in place lack the proper security, trusted access control, and management of privacy and confidentiality concerns that the current EHR systems are supposed to provide. Goal. For various EHR systems, this research proposes a Blockchain-enabled Hyperledger Fabric Ar
APA, Harvard, Vancouver, ISO, and other styles
36

Schmid, Philipp, Alisa Schaffhäuser, and Rasha Kashef. "IoTBChain: Adopting Blockchain Technology to Increase PLC Resilience in an IoT Environment." Information 14, no. 8 (2023): 437. http://dx.doi.org/10.3390/info14080437.

Full text
Abstract:
The networks on a centralized cloud architecture that interconnect Internet of Things (IoT) gadgets are not limited by national or jurisdictional borders. To ensure the secure sharing of sensitive user data among IoT gadgets, it is imperative to maintain security, resilience and trustless authentication. As a result, blockchain technology has become a viable option to provide such noteworthy characteristics. Blockchain technology is foundational for resolving many IoT security and privacy issues. Blockchain’s safe decentralization can solve the IoT ecosystem’s security, authentication and main
APA, Harvard, Vancouver, ISO, and other styles
37

Liu, Wei, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui, and Dong Zheng. "Secure and Efficient Smart Healthcare System Based on Federated Learning." International Journal of Intelligent Systems 2023 (February 27, 2023): 1–12. http://dx.doi.org/10.1155/2023/8017489.

Full text
Abstract:
The rapid development of smart healthcare system in the Internet of Things (IoT) has made the early detection of many chronic diseases more convenient, quick, and economical. However, when healthcare organizations collect users’ health data through deployed IoT devices, there are issues of compromising users’ privacy. In view of this situation, this paper introduces federated learning technology to solve the problem of data security. In this paper, we consider the two main problems of federated learning applications in IoT smart healthcare system: (1) how to reduce the time overhead of system
APA, Harvard, Vancouver, ISO, and other styles
38

Kravchuk, Serhii, and Iryna Kravchuk. "AUTHENTICATION OF WIRELESS SYSTEMS BASED ON A DRONE SWARM AS A COMPONENT OF THE 5G RADIO ACCESS NETWORK ARCHITECTURE." Information and Telecommunication Sciences, no. 1 (June 28, 2024): 18–27. http://dx.doi.org/10.20535/2411-2976.12024.18-27.

Full text
Abstract:
Background. When establishing security measures for telecommunication networks involving unmanned aerial vehicles (UAVs), characteristics such as high scalability, device diversity, and high mobility should be considered. Authentication is a fundamental property that allows a UAV network to establish secure communication between its core components. Authentication also protects the UAV network from attackers impersonating legitimate UAVs. UAV authentication can further secure the communication channel by preventing impersonation and replay attacks. The design of UAV access control schemes, suc
APA, Harvard, Vancouver, ISO, and other styles
39

Sikirat Damilola Mustapha and Abidemi Adeleye Alabi. "A conceptual model for integrating zero trust architecture into smart transport systems for enhanced security." Open Access Research Journal of Multidisciplinary Studies 2, no. 1 (2021): 158–75. https://doi.org/10.53022/oarjms.2021.2.1.0047.

Full text
Abstract:
The rapid adoption of smart transport systems (STS) underscores the need for robust cybersecurity frameworks to address escalating vulnerabilities in interconnected and automated environments. This paper proposes a conceptual model for integrating Zero Trust Architecture (ZTA) into STS, emphasizing a security paradigm that eliminates implicit trust and continuously verifies every access request. By leveraging ZTA principles, such as least privilege access, micro-segmentation, identity-based authentication, and real-time monitoring, the model aims to safeguard critical transport infrastructure
APA, Harvard, Vancouver, ISO, and other styles
40

Agrahari, Shaswat. "Eye Webinar: A Web-Based Communication Platform for Seamless Remote Education." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 5944–51. https://doi.org/10.22214/ijraset.2025.71621.

Full text
Abstract:
As our world grows increasingly digital, the ability to communicate remote is essential, whether for personal or professional reasons. Remote meetings are often limited to time, cost, and logistical constraints—the latter of which can be exacerbated during global disruptions. To address some of these issues, we present Eye Webinar, a real-time video conferencing web application that enables quality communication in a browser through video and audio with multiple users. Eye Webinar takes advantage of WebRTC, a free, open-source, technology that allows peer-to-peer real-time compressed audio, vi
APA, Harvard, Vancouver, ISO, and other styles
41

Muthusamy, P., and T. Sheela. "Sybil Attack Detection Based on Authentication Process Using Digital Security Certificate Procedure for Data Transmission in MANET." International Journal of Engineering & Technology 7, no. 3.27 (2018): 270. http://dx.doi.org/10.14419/ijet.v7i3.27.17891.

Full text
Abstract:
Mobile devices are becoming very popular due to the wide range of networking competence for the mobile device users. The security issues in MANET become the control towards the management of the multiple numbers of nodes in the MANET is distributed. To strategy for overcome the Sybil attack in MANET and improve the efficiency of the Sybil attack detection by enhancing the data confidentiality and reliability. The primary objective of this research work is to develop a scheme to detect and prevent the Sybil attack in the MANET and to provide a highly reliable data transmission approach. The pro
APA, Harvard, Vancouver, ISO, and other styles
42

Devineni, Sreenath, and Bhargavi Gorantla. "Security and Privacy Issues in Internet of Things (IoT) Devices Using COPRAS Method." 4 2, no. 4 (2023): 15–22. http://dx.doi.org/10.46632/jdaai/2/4/3.

Full text
Abstract:
This paper explores various security and privacy issues inherent in IoT devices, ranging from vulnerabilities in device firmware and software to data breaches and unauthorized access. We delve into the challenges of securing IoT devices due to their resource constraints, diverse communication protocols, and often lax security practices during development. Additionally, we discuss privacy implications stemming from the collection and sharing of sensitive personal data by IoT devices, as well as the potential for surveillance and data misuse. Furthermore, we examine the implications of IoT devic
APA, Harvard, Vancouver, ISO, and other styles
43

Pasha, Fairoz, and Jayapandian Natarajan. "Research on secure workload execution scheme in heterogeneous cloud environment." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 1047. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp1047-1054.

Full text
Abstract:
&lt;span lang="EN-US"&gt;The increasing demand for the hardware, software and infrastructure is playing a big role in the information technology domain towards the need of customer’s specific requirements. Cloud computing is a major backbone for providing such services over the internet. It includes the services such as applications, storage, network, scalability, sharing, virtualization, confidentiality, security, authentication, and integrity. A large number of data intensive workflow applications uses heterogeneous cloud environment for communication and computation operation. An intruder/a
APA, Harvard, Vancouver, ISO, and other styles
44

Fairoz, Pasha, and Natarajan Jayapandian. "Research on secure workload execution scheme in heterogeneous cloud environment." Research on secure workload execution scheme in heterogeneous cloud environment 29, no. 2 (2023): 1047–54. https://doi.org/10.11591/ijeecs.v29.i2.pp1047-1054.

Full text
Abstract:
The increasing demand for the hardware, software and infrastructure is playing a big role in the information technology domain towards the need of customer&rsquo;s specific requirements. Cloud computing is a major backbone for providing such services over the internet. It includes the services such as applications, storage, network, scalability, sharing, virtualization, confidentiality, security, authentication, and integrity. A large number of data intensive workflow applications uses heterogeneous cloud environment for communication and computation operation. An intruder/attacker will utiliz
APA, Harvard, Vancouver, ISO, and other styles
45

Korzhik, V. I., V. A. Yakovlev, B. V. Izotov, V. S. Starostin, and M. V. Buinevich. "Advance in Applied Cryptography Theory: Survey and New Results. Part 1. Key Cryptography." Proceedings of Telecommunication Universities 10, no. 4 (2024): 126–41. http://dx.doi.org/10.31854/1813-324x-2024-10-4-126-141.

Full text
Abstract:
In the current paper, consisting from two parts, are presented both results already published before (but hard for access) and new once. Actuality of this work is firstly in a fact that recently has been obtained a number of new results in area of applied cryptography that are needed both in a clarification and be put into practice. This is namely the main goal of the current paper. The setting problem in the first paper part concerns to a complexity of symmetric cipher breaking while in the second part of the paper is discussed, so called, keyless cryptography, namely: wiretap channel concept
APA, Harvard, Vancouver, ISO, and other styles
46

Amofa, Sandro, Qi Xia, Hu Xia, et al. "Blockchain-secure patient Digital Twin in healthcare using smart contracts." PLOS ONE 19, no. 2 (2024): e0286120. http://dx.doi.org/10.1371/journal.pone.0286120.

Full text
Abstract:
Modern healthcare has a sharp focus on data aggregation and processing technologies. Consequently, from a data perspective, a patient may be regarded as a timestamped list of medical conditions and their corresponding corrective interventions. Technologies to securely aggregate and access data for individual patients in the quest for precision medicine have led to the adoption of Digital Twins in healthcare. Digital Twins are used in manufacturing and engineering to produce digital models of physical objects that capture the essence of device operation to enable and drive optimization. Thus, a
APA, Harvard, Vancouver, ISO, and other styles
47

Pöhn, Daniela, and Wolfgang Hommel. "Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems." Security and Communication Networks 2023 (June 19, 2023): 1–30. http://dx.doi.org/10.1155/2023/5573310.

Full text
Abstract:
Digital transformation with the adoption of cloud technologies, outsourcing, and working-from-home possibilities permits flexibility for organizations and persons. At the same time, it makes it more difficult to secure the IT infrastructure as the IT team needs to keep track of who is accessing what data from where and when on which device. With these changes, identity management as a key element of security becomes more important. Identity management relates to the technologies and policies for the identification, authentication, and authorization of users (humans and devices) in computer net
APA, Harvard, Vancouver, ISO, and other styles
48

S, Swetha, and Joe Prathap P M. "A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes." PeerJ Computer Science 11 (June 17, 2025): e2930. https://doi.org/10.7717/peerj-cs.2930.

Full text
Abstract:
Background With the enhanced data amount being created, it is significant to various organizations and their processing, and managing big data becomes a significant challenge for the managers of the data. The development of inexpensive and new computing systems and cloud computing sectors gave qualified industries to gather and retrieve the data very precisely however securely delivering data across the network with fewer overheads is a demanding work. In the decentralized framework, the big data sharing puts a burden on the internal nodes among the receiver and sender and also creates the con
APA, Harvard, Vancouver, ISO, and other styles
49

Sujatha, S., and T. Sreenivasulu Reddy. "Robust Medical Image Watermarking and Brain TumorSegmentation Using Multi-Domain Transforms And Deep ‎Learning." International Journal of Basic and Applied Sciences 14, no. 3 (2025): 406–17. https://doi.org/10.14419/7zws5x66.

Full text
Abstract:
This observation introduces a unified framework that guarantees both the stable watermarking of medical pics and ‎effective brain tumor segmentation. By leveraging a hybrid approach that integrates deep learning with a ‎couple of area transformation strategies, the device complements photograph security and diagnostic precision. ‎The approach embeds MRI scans into host photographs through a fusion of Discrete Wavelet Transform, Discrete ‎Cosine Transform, and Singular Value Decomposition. The embedding strength is adaptively optimized using ‎Black Widow Optimization guided by a Genetic Algorit
APA, Harvard, Vancouver, ISO, and other styles
50

Piedrahita, Solorzano Giovanny Andrés, Gutiérrez Anderson Flórez, and Angie Paola Gordillo. "Data Security Threats On Smart Devices At Home." ARPHA Conference Abstracts 6 (June 20, 2023): e106978. https://doi.org/10.3897/aca.6.e106978.

Full text
Abstract:
The Internet of things (IoT) has been trending recently as a new technology for connecting devices to the Internet, from simple sensors or actuators to more powerful components with processing and prediction capabilities. Although home automation is not new, IoT has boosted domotics by allowing remote management of security and energy through mobile phones and providing new (smart) and more natural methods of interaction with home devices (Edu et al. 2019). Along with this trend, information security concerns have also emerged due to the possible security breaches and personal data access by I
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!