Y Sharaf-Dabbagh, W Saad - … on A World of Wireless, Mobile …, 2016 - ieeexplore.ieee.org
… In this paper, an object authentication framework is proposed to exploit device-specific … Simulation results show that the proposed framework improves the authentication accuracy. …
Y Atwady, M Hammoudeh - … of the international conference on future …, 2017 - dl.acm.org
… Another IoT authentication technique that relies on patented hardware is presented in [13]. … IoT deviceauthentication using its physical unclonable functions. A unique authentication …
A Badhib, S Alshehri, A Cherif - IEEE Access, 2021 - ieeexplore.ieee.org
… authenticating user-to-device (U2D), eg, [15], [16], [17], [18], etc. Therefore, this research focuses on continuous authentication between devices referred to as device-to-device (D2D), …
… authentication mechanisms. Consequently, we highlighted enormous attacks and technical methods on the IoT authentication … evaluation schemes of IoT authentication. Furthermore, …
O Lucia, B Isong, N Gasela… - 2019 International …, 2019 - ieeexplore.ieee.org
… Based on this analysis, we found that deviceauthentication is a serious security challenge in the IoT realm. Moreover, several solutions have been offered with each having its unique …
O Bello, S Zeadally - IEEE Systems Journal, 2014 - ieeexplore.ieee.org
… Among other procedures, the cellular network infrastructure facilitates link discovery and security procedures such as deviceauthentication [21]. The first step in realizing D2D …
KH Wang, CM Chen, W Fang, TY Wu - Pervasive and Mobile Computing, 2017 - Elsevier
… Have the embedded device or the server falsely accept an authentication scheme when … { T i , P 3 , P 4 } are transmitted to the device for authentication. The device then validates the …
Y Sun, FPW Lo, B Lo - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
… of vital importance to any Internet of Things (IoT) … to deviceauthentication and wireless communication encryption. In this article, we propose a novel lightweight IoT deviceauthentication…
M Hussain, U Jain - International Journal of Communication …, 2020 - Wiley Online Library
… In this paper, we proposed a mechanism for deviceauthentication which enables smart devices to mutually authenticate each other. The proposed mechanism enables smart devices to …