These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
527 related articles for article (PubMed ID: 34372360)
1. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction. Istiaque Ahmed K; Tahir M; Hadi Habaebi M; Lun Lau S; Ahad A Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372360 [TBL] [Abstract][Full Text] [Related]
2. A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions. Khalil U; Malik OA; Uddin M; Chen CL Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890848 [TBL] [Abstract][Full Text] [Related]
3. Hyperledger Fabric Blockchain for Securing the Edge Internet of Things. Honar Pajooh H; Rashid M; Alam F; Demidenko S Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33430274 [TBL] [Abstract][Full Text] [Related]
4. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things. Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568 [TBL] [Abstract][Full Text] [Related]
5. Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities. Asif M; Aziz Z; Bin Ahmad M; Khalid A; Waris HA; Gilani A Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408219 [TBL] [Abstract][Full Text] [Related]
6. Secure Authentication and Credential Establishment in Narrowband IoT and 5G. Sanchez-Gomez J; Garcia-Carrillo D; Marin-Perez R; Skarmeta AF Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32045992 [TBL] [Abstract][Full Text] [Related]
7. Blockchain-Based Context-Aware Authorization Management as a Service in IoT. Sylla T; Mendiboure L; Chalouf MA; Krief F Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833732 [TBL] [Abstract][Full Text] [Related]
8. LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment. Wazid M; Das AK; Shetty S; J P C Rodrigues J; Park Y Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31847431 [TBL] [Abstract][Full Text] [Related]
9. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Mrabet H; Belguith S; Alhomoud A; Jemai A Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32605178 [TBL] [Abstract][Full Text] [Related]
10. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge. Pardeshi MS; Sheu RK; Yuan SM Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563 [TBL] [Abstract][Full Text] [Related]
11. Blockchain-Based Secure Authentication with Improved Performance for Fog Computing. Umoren O; Singh R; Awan S; Pervez Z; Dahal K Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433564 [TBL] [Abstract][Full Text] [Related]
12. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Tariq N; Asim M; Al-Obeidat F; Zubair Farooqi M; Baker T; Hammoudeh M; Ghafir I Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31013993 [TBL] [Abstract][Full Text] [Related]
13. A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms. Diro A; Chilamkurti N; Nguyen VD; Heyne W Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960414 [TBL] [Abstract][Full Text] [Related]
14. DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices. Sadique KM; Rahmani R; Johannesson P Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112389 [TBL] [Abstract][Full Text] [Related]
15. Multi-Layer Blockchain-Based Security Architecture for Internet of Things. Honar Pajooh H; Rashid M; Alam F; Demidenko S Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33498860 [TBL] [Abstract][Full Text] [Related]
16. IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices. Sadique KM; Rahmani R; Johannesson P Sensors (Basel); 2020 Nov; 20(22):. PubMed ID: 33207820 [TBL] [Abstract][Full Text] [Related]
17. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks. Kim KW; Han YH; Min SG Sensors (Basel); 2017 Sep; 17(10):. PubMed ID: 28934152 [TBL] [Abstract][Full Text] [Related]
18. A Lightweight Authentication and Key Agreement Schemes for IoT Environments. Lee DH; Lee IY Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32961979 [TBL] [Abstract][Full Text] [Related]
19. Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance. Sahu SK; Mazumdar K Front Artif Intell; 2024; 7():1397480. PubMed ID: 38845684 [TBL] [Abstract][Full Text] [Related]
20. Security at the Edge for Resource-Limited IoT Devices. Canavese D; Mannella L; Regano L; Basile C Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257680 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]