New enhanced authentication protocol for internet of things

M Azrour, J Mabrouki, A Guezzaz… - Big Data Mining and …, 2021 - ieeexplore.ieee.org
… In Section 3, we detail our proposed IoT authentication protocol. The security analysis
and performance comparison are given in Sections 4 and 5, respectively. Then the paper is …

Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty
authentication protocols … These protocols are categorized based on the target environment: (…

A robust and energy efficient authentication protocol for industrial internet of things

X Li, J Peng, J Niu, F Wu, J Liao… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
… However, their protocol cannot provide proper mutual authentication and has other security
… user authentication protocol for WSN to remove the weaknesses of previous protocols. The …

Enhanced authentication protocol for the Internet of Things environment

CM Chen, X Li, S Liu, ME Wu… - Security and …, 2022 - Wiley Online Library
… To resolve these security weaknesses, we propose a new authentication and key agreement
protocol. In addition, we demonstrate that the proposed protocol is provably secure in real-…

A lightweight continuous authentication protocol for the Internet of Things

YH Chuang, NW Lo, CY Yang, SW Tang - Sensors, 2018 - mdpi.com
… device-to-device continuous authentication protocol to authenticate each data message …
authentication protocol has the following features: (i) the protocol supports mutual authentication

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
authentication protocols pivotal to the security of IoT. First, this survey discusses the applications
that need authentication … for IoT applications in LTE system,’’ Internet Things, vol. 22, Jul…

Authentication protocol for securing internet of things

A Maarof, M Senhadji, Z Labbi… - Proceedings of the Fourth …, 2018 - dl.acm.org
… claimed that their protocol assure the mutual authentication phase, however we will show
that this protocol couldn’t … Authentication Phase Our proposed protocol is designed to achieve …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
authentication protocols. Therefore, the contributors to this paper include all the aspects of
authentication protocols of IoT. … in Internet of Things,’’ IEEE Internet Things J., vol. 4, no. 5, pp. …

Toward secure and provable authentication for Internet of Things: Realizing industry 4.0

S Garg, K Kaur, G Kaddoum… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
authentication protocol on the universally acknowledged AVISPA tool [32]. It is used in the
security assessment of authentication protocols and … ,” IEEE Internet Things J., vol. 4, no. 5, pp. …

A survey of internet of things (IoT) authentication schemes

M El-Hajj, A Fadlallah, M Chamoun, A Serhrouchni - Sensors, 2019 - mdpi.com
… the IoT authentication field. It provides a summary of a large range of authentication protocols
… , it compares and evaluates the proposed authentication protocols, showing their strengths …