New enhanced authentication protocol for internet of things

M Azrour, J Mabrouki, A Guezzaz… - Big Data Mining and …, 2021 - ieeexplore.ieee.org
… In Section 3, we detail our proposed IoT authentication protocol. The security analysis
and performance comparison are given in Sections 4 and 5, respectively. Then the paper is …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
authentication protocols. Therefore, the contributors to this paper include all the aspects of
authentication protocols of IoT. … in Internet of Things,’’ IEEE Internet Things J., vol. 4, no. 5, pp. …

Toward secure and provable authentication for Internet of Things: Realizing industry 4.0

S Garg, K Kaur, G Kaddoum… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
authentication protocol on the universally acknowledged AVISPA tool [32]. It is used in the
security assessment of authentication protocols and … ,” IEEE Internet Things J., vol. 4, no. 5, pp. …

A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
… the IoT authentication field. It provides a summary of a large range of authentication protocols
… , it compares and evaluates the proposed authentication protocols, showing their strengths …

A lightweight anonymous authentication protocol for resource-constrained devices in Internet of Things

X Ding, X Wang, Y Xie, F Li - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
… variety of authentication protocols for IoT environment, the resource costs of these protocols
are still … To improve the situation, this paper proposes an anonymous authentication protocol

Internet of things security, device authentication and access control: a review

I Ali, S Sabir, Z Ullah - arXiv preprint arXiv:1901.07309, 2019 - arxiv.org
authentication protocol by enhancing the original RFID system security base on IoT .In the
existing RFID protocol authentication is … light weight cryptographic protocol based on XOR …

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
… In this section, we concentrate on the authentication protocols that majorly contributes in
WSN maintaining the WSN objectives. We also show the evolution of the methods and try to …

An improved authentication protocol using smart cards for the Internet of Things

C Shouqi, L Wanrong, C Liling, H Xin, J Zhiyong - IEEE Access, 2019 - ieeexplore.ieee.org
… et al.’s protocol framework. Our protocol is an improved authentication protocol using
smart cards for the Internet of Things based on Nikooghadam et al.’s protocol framework. Our …

A privacy-preserving code-based authentication protocol for Internet of Things

N Chikouche, PL Cayrel, EHM Mboup… - The Journal of …, 2019 - Springer
… present different security requirements in IoT authentication protocols, different possible
attacks, and the adversarial model agreed in the security analysis of authentication protocols. …

A robust device-to-device continuous authentication protocol for the internet of things

A Badhib, S Alshehri, A Cherif - IEEE Access, 2021 - ieeexplore.ieee.org
… Additionally, the work done in D2D continuous authentication has been limited. As a result,
our aim is to design a D2D continuous authentication protocol, that overcomes the previous …