… authenticationprotocols for Internet of Things (IoT) is presented. Specifically more than forty authenticationprotocols … These protocols are categorized based on the target environment: (…
X Li, J Peng, J Niu, F Wu, J Liao… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
… However, their protocol cannot provide proper mutual authentication and has other security … user authenticationprotocol for WSN to remove the weaknesses of previous protocols. The …
CM Chen, X Li, S Liu, ME Wu… - Security and …, 2022 - Wiley Online Library
… To resolve these security weaknesses, we propose a new authentication and key agreement protocol. In addition, we demonstrate that the proposed protocol is provably secure in real-…
… device-to-device continuous authenticationprotocol to authenticate each data message … authenticationprotocol has the following features: (i) the protocol supports mutual authentication…
… authenticationprotocols pivotal to the security of IoT. First, this survey discusses the applications that need authentication … for IoT applications in LTE system,’’ InternetThings, vol. 22, Jul…
A Maarof, M Senhadji, Z Labbi… - Proceedings of the Fourth …, 2018 - dl.acm.org
… claimed that their protocol assure the mutual authentication phase, however we will show that this protocol couldn’t … Authentication Phase Our proposed protocol is designed to achieve …
… authenticationprotocols. Therefore, the contributors to this paper include all the aspects of authenticationprotocols of IoT. … in Internet of Things,’’ IEEE InternetThings J., vol. 4, no. 5, pp. …
… authenticationprotocol on the universally acknowledged AVISPA tool [32]. It is used in the security assessment of authenticationprotocols and … ,” IEEE InternetThings J., vol. 4, no. 5, pp. …
… the IoT authentication field. It provides a summary of a large range of authenticationprotocols … , it compares and evaluates the proposed authenticationprotocols, showing their strengths …