Internet of things security, device authentication and access control: a review

I Ali, S Sabir, Z Ullah - arXiv preprint arXiv:1901.07309, 2019 - arxiv.org
… solutions, authentication mechanisms and key management in IoT. Device authentication
and … We spent our efforts to bring the state of the art device authentication and access control …

On the authentication of devices in the Internet of Things

Y Sharaf-Dabbagh, W Saad - … on A World of Wireless, Mobile …, 2016 - ieeexplore.ieee.org
… In this paper, an object authentication framework is proposed to exploit device-specific …
Simulation results show that the proposed framework improves the authentication accuracy. …

A survey on authentication techniques for the internet of things

Y Atwady, M Hammoudeh - … of the international conference on future …, 2017 - dl.acm.org
… Another IoT authentication technique that relies on patented hardware is presented in [13]. …
IoT device authentication using its physical unclonable functions. A unique authentication

A robust device-to-device continuous authentication protocol for the internet of things

A Badhib, S Alshehri, A Cherif - IEEE Access, 2021 - ieeexplore.ieee.org
… authenticating user-to-device (U2D), eg, [15], [16], [17], [18], etc. Therefore, this research
focuses on continuous authentication between devices referred to as device-to-device (D2D), …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
authentication mechanisms. Consequently, we highlighted enormous attacks and technical
methods on the IoT authentication … evaluation schemes of IoT authentication. Furthermore, …

Device authentication schemes in IoT: A Review

O Lucia, B Isong, N Gasela… - 2019 International …, 2019 - ieeexplore.ieee.org
… Based on this analysis, we found that device authentication is a serious security challenge
in the IoT realm. Moreover, several solutions have been offered with each having its unique …

Intelligent device-to-device communication in the internet of things

O Bello, S Zeadally - IEEE Systems Journal, 2014 - ieeexplore.ieee.org
… Among other procedures, the cellular network infrastructure facilitates link discovery and
security procedures such as device authentication [21]. The first step in realizing D2D …

A secure authentication scheme for internet of things

KH Wang, CM Chen, W Fang, TY Wu - Pervasive and Mobile Computing, 2017 - Elsevier
… Have the embedded device or the server falsely accept an authentication scheme when …
{ T i , P 3 , P 4 } are transmitted to the device for authentication. The device then validates the …

Lightweight internet of things device authentication, encryption, and key distribution using end-to-end neural cryptosystems

Y Sun, FPW Lo, B Lo - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
… of vital importance to any Internet of Things (IoT) … to device authentication and wireless
communication encryption. In this article, we propose a novel lightweight IoT device authentication

Simple and secure device authentication mechanism for smart environments using Internet of things devices

M Hussain, U Jain - International Journal of Communication …, 2020 - Wiley Online Library
… In this paper, we proposed a mechanism for device authentication which enables smart
devices to mutually authenticate each other. The proposed mechanism enables smart devices to …