Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    REVIEW

    Internet of Things Authentication Protocols: Comparative Study

    Souhayla Dargaoui1, Mourade Azrour1,*, Ahmad El Allaoui1, Azidine Guezzaz2, Abdulatif Alabdulatif3, Abdullah Alnajim4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 65-91, 2024, DOI:10.32604/cmc.2024.047625

    Abstract Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still the biggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures, data, and devices. Authentication, as the first line of defense against security threats, becomes the priority of everyone. It can either grant or deny users access to resources according… More >

  • Open Access

    ARTICLE

    Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications

    Usman Ali1,2, Mohd Yamani Idna Idris1,3,*, Jaroslav Frnda4, Mohamad Nizam Bin Ayub1, Roobaea Alroobaea5, Fahad Almansour6, Nura Modi Shagari1, Insaf Ullah7, Ihsan Ali1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2515-2532, 2022, DOI:10.32604/cmc.2022.019800

    Abstract Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoT environment. In this paper, we propose a… More >

Displaying 1-10 on page 1 of 2. Per Page