Automatic Security Analysis of Lightweight Authentication and Key Exchange Protocols

A Kabra - 2022 - ntnuopen.ntnu.no
… them useless for constrained devices. Consequently, … , concluding that authentication and
key exchange must be linked to … In the wake of substantially large number of flawed protocols, …

[PDF][PDF] Analysis of the EDHOC Lightweight Authenticated Key Exchange Protocol

MIT Mukendi - 2022 - ethz.ch
devices is a lightweight and secure key exchange protocol. … is a lightweight authenticated
key exchange protocol (LAKE) … Currently, in draft 15, as of this writing, the LAKE working …

A provably secure and lightweight anonymous user authenticated session key exchange scheme for Internet of Things deployment

S Banerjee, V Odelu, AK Das, J Srinivas… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
… To achieve this goal, we develop a secure and lightweight user authentication and session
key … SD through GWN, in order to negotiate a session key for accessing the device data. …

Make-it—A lightweight mutual authentication and key exchange protocol for industrial internet of things

K Choudhary, GS Gaba, I Butun, P Kumar - Sensors, 2020 - mdpi.com
… In the IoT domain, there are some standardization efforts to provide authenticated key
exchange for constrained devices [28]; such as Ephemeral Diffie-Hellman Over COSE (EDHOC) […

Eake-wc: Efficient and anonymous authenticated key exchange scheme for wearable computing

S Tu, A Badshah, H Alasmary… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
authenticated key exchange scheme for wearable computing (EAKE-WC), which performs
mutual authentication between the user and the wearable device, and … By utilizing lightweight

An improved lightweight authentication protocol for wireless body area networks

BA Alzahrani, A Irshad, A Albeshri, K Alsubhi… - IEEE …, 2020 - ieeexplore.ieee.org
… body sensors and wearable devices of the patient, submit the … key contributions: 1) We
proposed a novel lightweight patient-health monitoring authentication protocol in the wake

Lightweight Authentication Scheme for IoT based E-Healthcare Service Communication

MM Salim, LT Yang, JH Park - IEEE Journal of Biomedical and …, 2023 - ieeexplore.ieee.org
… -device communication for data sharing requires a robust, lightweight, secure key exchange
… [29] proposed a Lightweight Authentication and Key Exchange (LAKE) protocol focusing on …

A novel lightweight block cipher-based mutual authentication protocol for constrained environments

C Trinh, B Huynh, J Lansky, S Mildeova… - IEEE …, 2020 - ieeexplore.ieee.org
… Hence, thanks to the recent advances in lightweight ciphers, to provide a secure protocol for
… and IoT edge devices, we propose a new authentication protocol based on lightweight block …

Provably secure lightweight certificateless lattice‐based authenticated key exchange scheme for IIoT

Z Tan, J Jiao, Y Chen - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
… In our C2LAKE scheme, the smart device or worker may generate and send a request to
each other to start the process of an AKA process, the request consists of the session …

Lightweight cryptography for IoT devices

PMC Rosa - 2022 - repositorio.ul.pt
… • Class 0: Devices in this category are the most constrained in … PK, a prime value p and g for
the DH key exchange protocol … key must be renew every 20 seconds, the thread will wake up …