526 related articles for article (PubMed ID: 34372360)
1. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.
Istiaque Ahmed K; Tahir M; Hadi Habaebi M; Lun Lau S; Ahad A
Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372360
[TBL] [Abstract][Full Text] [Related]
2. A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions.
Khalil U; Malik OA; Uddin M; Chen CL
Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890848
[TBL] [Abstract][Full Text] [Related]
3. Hyperledger Fabric Blockchain for Securing the Edge Internet of Things.
Honar Pajooh H; Rashid M; Alam F; Demidenko S
Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33430274
[TBL] [Abstract][Full Text] [Related]
4. A secure remote user authentication scheme for 6LoWPAN-based Internet of Things.
Abbas G; Tanveer M; Abbas ZH; Waqas M; Baker T; Al-Jumeily Obe D
PLoS One; 2021; 16(11):e0258279. PubMed ID: 34748568
[TBL] [Abstract][Full Text] [Related]
5. Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities.
Asif M; Aziz Z; Bin Ahmad M; Khalid A; Waris HA; Gilani A
Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408219
[TBL] [Abstract][Full Text] [Related]
6. Secure Authentication and Credential Establishment in Narrowband IoT and 5G.
Sanchez-Gomez J; Garcia-Carrillo D; Marin-Perez R; Skarmeta AF
Sensors (Basel); 2020 Feb; 20(3):. PubMed ID: 32045992
[TBL] [Abstract][Full Text] [Related]
7. Blockchain-Based Context-Aware Authorization Management as a Service in IoT.
Sylla T; Mendiboure L; Chalouf MA; Krief F
Sensors (Basel); 2021 Nov; 21(22):. PubMed ID: 34833732
[TBL] [Abstract][Full Text] [Related]
8. LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
Wazid M; Das AK; Shetty S; J P C Rodrigues J; Park Y
Sensors (Basel); 2019 Dec; 19(24):. PubMed ID: 31847431
[TBL] [Abstract][Full Text] [Related]
9. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis.
Mrabet H; Belguith S; Alhomoud A; Jemai A
Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32605178
[TBL] [Abstract][Full Text] [Related]
10. Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.
Pardeshi MS; Sheu RK; Yuan SM
Sensors (Basel); 2022 Jan; 22(2):. PubMed ID: 35062563
[TBL] [Abstract][Full Text] [Related]
11. Blockchain-Based Secure Authentication with Improved Performance for Fog Computing.
Umoren O; Singh R; Awan S; Pervez Z; Dahal K
Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433564
[TBL] [Abstract][Full Text] [Related]
12. The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
Tariq N; Asim M; Al-Obeidat F; Zubair Farooqi M; Baker T; Hammoudeh M; Ghafir I
Sensors (Basel); 2019 Apr; 19(8):. PubMed ID: 31013993
[TBL] [Abstract][Full Text] [Related]
13. A Comprehensive Study of Anomaly Detection Schemes in IoT Networks Using Machine Learning Algorithms.
Diro A; Chilamkurti N; Nguyen VD; Heyne W
Sensors (Basel); 2021 Dec; 21(24):. PubMed ID: 34960414
[TBL] [Abstract][Full Text] [Related]
14. DIdM-EIoTD: Distributed Identity Management for Edge Internet of Things (IoT) Devices.
Sadique KM; Rahmani R; Johannesson P
Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112389
[TBL] [Abstract][Full Text] [Related]
15. Multi-Layer Blockchain-Based Security Architecture for Internet of Things.
Honar Pajooh H; Rashid M; Alam F; Demidenko S
Sensors (Basel); 2021 Jan; 21(3):. PubMed ID: 33498860
[TBL] [Abstract][Full Text] [Related]
16. IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices.
Sadique KM; Rahmani R; Johannesson P
Sensors (Basel); 2020 Nov; 20(22):. PubMed ID: 33207820
[TBL] [Abstract][Full Text] [Related]
17. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.
Kim KW; Han YH; Min SG
Sensors (Basel); 2017 Sep; 17(10):. PubMed ID: 28934152
[TBL] [Abstract][Full Text] [Related]
18. A Lightweight Authentication and Key Agreement Schemes for IoT Environments.
Lee DH; Lee IY
Sensors (Basel); 2020 Sep; 20(18):. PubMed ID: 32961979
[TBL] [Abstract][Full Text] [Related]
19. Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance.
Sahu SK; Mazumdar K
Front Artif Intell; 2024; 7():1397480. PubMed ID: 38845684
[TBL] [Abstract][Full Text] [Related]
20. Security at the Edge for Resource-Limited IoT Devices.
Canavese D; Mannella L; Regano L; Basile C
Sensors (Basel); 2024 Jan; 24(2):. PubMed ID: 38257680
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]