[HTML][HTML] An efficient IoT group association and data sharing mechanism in edge computing paradigm

H Tan - Cyber Security and Applications, 2023 - Elsevier
Despite its benefits and promising future, security and privacy challenges for the IoT wireless
communication of edge computing environment remain unaddressed. As a result, proper …

Reliable and secure data transfer in IoT networks

SP Gochhayat, C Lal, L Sharma, DP Sharma, D Gupta… - Wireless …, 2020 - Springer
With the rapid technological improvements in mobile devices and their inclusion in Internet
of Things (IoT), secure key management becomes mandatory to ensure security of …

An anonymous authentication and key update mechanism for IoT devices based on EnOcean protocol

Y Wu, T Feng - Sensors, 2022 - mdpi.com
EnOcean, a commonly used control protocol in smart lighting systems, provides
authentication, as well as message integrity verification services, and can resist replay attack …

REPS-AKA5: A robust group-based authentication protocol for IoT applications in LTE system

MA Mobarhan, M Salamah - Internet of Things, 2023 - Elsevier
Abstract Nowadays, Internet of Things systems connect several smart devices to provide
required services. The IoT applications employ Machine Type Communications to meet the …

LDAKM-EIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment

M Wazid, AK Das, S Shetty, J JPC Rodrigues, Y Park - Sensors, 2019 - mdpi.com
In recent years, edge computing has emerged as a new concept in the computing paradigm
that empowers several future technologies, such as 5G, vehicle-to-vehicle communications …

SUACC-IoT: Secure unified authentication and access control system based on capability for IoT

N Sivaselvan, KV Bhat, M Rajarajan, AK Das… - Cluster …, 2023 - Springer
With the widespread use of Internet of Things (IoT) in various applications and several
security vulnerabilities reported in them, the security requirements have become an integral …

Reconfigurable security: Edge-computing-based framework for IoT

RH Hsu, J Lee, TQS Quek, JC Chen - IEEE Network, 2018 - ieeexplore.ieee.org
In various scenarios, achieving security between IoT devices is challenging since the
devices may have different dedicated communication standards and resource constraints as …

Provable privacy preserving authentication solution for internet of things environment

BA Alzahrani, K Mahmood - IEEE Access, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has become an important technology which permits different
devices and machines to interconnect with each other using heterogeneous networks. The …

A lightweight authentication and key exchange protocol with anonymity for IoT

D He, Y Cai, S Zhu, Z Zhao, S Chan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The number of IoT devices is growing rapidly, and the interaction between devices and
servers is also more frequent. However, IoT devices are often at the edge of the network …

A flexible and efficient authentication and secure data transmission scheme for IoT applications

D Fang, Y Qian, RQ Hu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) applications have been rapidly deployed into pervasive
environment, where both challenges and opportunities abound. On the one hand, a large …