A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
authentication protocols pivotal to the security of IoT. First, this survey discusses the applications
that need authentication … current research on these application fields. Subsequently, this …

Two-phase authentication protocol for wireless sensor networks in distributed IoT applications

P Porambage, C Schmitt, P Kumar… - 2014 IEEE Wireless …, 2014 - ieeexplore.ieee.org
… on application layer protocol to prove trusted communication [3]. Host Identity Protocol (HIP)
is a network layer authentication protocol … ) is a mutual authentication scheme proposed for …

Implementation of open authentication protocol for IoT based application

S Kinikar, S Terdal - 2016 International Conference on Inventive …, 2016 - ieeexplore.ieee.org
… using open authentication protocol where you need … authentication protocols available
today, OAuth provides many leading organizations with a simple and secure way to authenticate

An anonymous two-factor authentication protocol for IoT-based applications

MJ Sadri, MR Asaar - Computer Networks, 2021 - Elsevier
authentication protocol for IoT and claimed that their protocol is secure against all known
attacks. We analyze their protocol … Then, we propose a two-factor authentication protocol that is …

A Secure and Lightweight Three‐Factor Remote User Authentication Protocol for Future IoT Applications

BH Taher, H Liu, F Abedi, H Lu, AA Yassin… - Journal of …, 2021 - Wiley Online Library
… In summary, most remote user authentication protocols either fail to achieve IoT WSN …
a lightweight remote user authentication protocol suited for the IoT WSN application, which …

New enhanced authentication protocol for internet of things

M Azrour, J Mabrouki, A Guezzaz… - Big Data Mining and …, 2021 - ieeexplore.ieee.org
… In Section 3, we detail our proposed IoT authentication protocol. The security analysis
and … Then, we proposed a new enhanced authentication protocol for IoTs applications. …

Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
… Internet of Things (IoT) holds great promise for many life-improving applications. According to
… connected things, including sensors, actuators, GPS devices, mobile devices, and all smart …

A Review on Authentication Protocol and ECC in IOT

A Srivastava, A Kumar - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
… of Things (IoT) authentication protocol in this article. Specifically, more than 40 authentication
protocols … To do this, we customize the authentication protocol of the application and …

An improved lightweight two-factor authentication protocol for IoT applications

AMA Modarres, G Sarbishaei - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
… et al.’s protocol and discuss its weaknesses and vulnerabilities. Then, we propose an
improved two-factor authentication protocol to provide strong mutual authentication and overcome …

BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology

M Vivekanandan, S VN, SR U - Peer-to-Peer networking and applications, 2021 - Springer
… lacks security and privacy [36] raising a need for authentication. To address the security
challenges, we propose blockchain based authentication protocol for IoT devices using 5G. …