… on application layer protocol to prove trusted communication [3]. Host Identity Protocol (HIP) is a network layer authenticationprotocol … ) is a mutual authentication scheme proposed for …
S Kinikar, S Terdal - 2016 International Conference on Inventive …, 2016 - ieeexplore.ieee.org
… using open authenticationprotocol where you need … authenticationprotocols available today, OAuth provides many leading organizations with a simple and secure way to authenticate …
… authenticationprotocol for IoT and claimed that their protocol is secure against all known attacks. We analyze their protocol … Then, we propose a two-factor authenticationprotocol that is …
BH Taher, H Liu, F Abedi, H Lu, AA Yassin… - Journal of …, 2021 - Wiley Online Library
… In summary, most remote user authenticationprotocols either fail to achieve IoT WSN … a lightweight remote user authenticationprotocol suited for the IoT WSN application, which …
… In Section 3, we detail our proposed IoT authenticationprotocol. The security analysis and … Then, we proposed a new enhanced authenticationprotocol for IoTs applications. …
… Internet of Things (IoT) holds great promise for many life-improving applications. According to … connected things, including sensors, actuators, GPS devices, mobile devices, and all smart …
A Srivastava, A Kumar - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
… of Things (IoT) authenticationprotocol in this article. Specifically, more than 40 authentication protocols … To do this, we customize the authenticationprotocol of the application and …
AMA Modarres, G Sarbishaei - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
… et al.’s protocol and discuss its weaknesses and vulnerabilities. Then, we propose an improved two-factor authenticationprotocol to provide strong mutual authentication and overcome …
M Vivekanandan, S VN, SR U - Peer-to-Peer networking and applications, 2021 - Springer
… lacks security and privacy [36] raising a need for authentication. To address the security challenges, we propose blockchain based authenticationprotocol for IoT devices using 5G. …