[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL

E AYDIN - 2022 - polen.itu.edu.tr
This thesis in general focuses on the scalability, resource, and latency issues of
authentication schemes actively used in wireless sensor and 3rd generation partnership …

Group authentication for next generation networks

Y Aydın - polen.itu.edu.tr
Özet In this thesis, it is proposed and simulated to perform handover operations as a group
to decrease time latency and the number of communication. The security aspects of the …

[PDF][PDF] Authentication schemes in wireless internet of things sensor networks: a survey and comparison

P Phalaagae, AM Zungeru, B Sigweni… - Indonesian Journal of …, 2024 - researchgate.net
The proliferation of wireless sensor networks (WSNs) fuels internet of things (IoT's) rapid
global development, connecting diverse devices. IoT transforms devices into intelligent …

A secure and efficient cluster-based authentication scheme for Internet of Things (IoTs)

K Imran, N Anjum, A Alghamdi, A Shaikh… - Computers, Materials …, 2022 - eprints.glos.ac.uk
IPv6 over Low Power Wireless Personal Area Network 6LoWPAN) provides IP connectivity
to the highly constrained nodes in the Internet of Things (IoTs). 6LoWPAN allows nodes with …

[PDF][PDF] Group-Based Authentication Schemes used for Machine Type Communication Devices in WSN: A Review

R Kadir - researchgate.net
M2M communication is the next vital part of IoT infrastructure. It is extremely important for IoT
systems to prosper in machine-type communication (MTC) devices that have low …

A Review of Authentication Schemes in Internet of Things

U Verma - International Conference on Machine Learning, Image …, 2023 - Springer
Abstract Internet of Things (IoT) has emerged as one of the most important technological
developments in recent years, because of its ability to process a wide range of application …

A flexible and lightweight group authentication scheme

Y Aydin, GK Kurt, E Ozdemir… - IEEE internet of things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) networks are becoming a part of our daily lives, as the number of IoT
devices around us are surging. The authentication of millions of connected things and the …

Secure Protocol for Resource-Constrained IoT Device Authentication

VO Nyangaresi, AJ Rodrigues… - International Journal of …, 2022 - igi-global.com
Wireless sensor networks (WSNs) are crucial components of internet of things (IoT) and
have been deployed in numerous fields such as battlefield surveillance. The exploitation of …

A Group-oriented Authentication Scheme for IoT Devices in 5G Networks

Q Guo, C Lai, H Ma, D Zheng - 2023 19th International …, 2023 - ieeexplore.ieee.org
One of the 5G support for IoT is Massive Machine Type Communication (mMTC). However, it
also poses a great challenge to the IoT network, which cannot cope with the massive …

A secure authentication scheme framework for mobile-sinks used in the internet of drones applications

YK Ever - Computer Communications, 2020 - Elsevier
Within the last decade, communication technologies have evolved rapidly, and this caused
significant advancements for Internet of Things (IoT) applications and services. Unmanned …