Device identification and personal data attestation in networks

C Gritti, M Önen, R Molva, W Susilo… - Journal of Wireless Mobile …, 2018 - hal.science
A powerful world connecting digital and physical environments is promised through the
Internet of Things (IoT). However, because of the heterogeneous nature of devices and of …

[PDF][PDF] Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes.

MM Hossain, R Hasan - ICIOT, 2017 - researchgate.net
The Internet of Things (IoT) devices perform security-critical operations and deal with
sensitive information in the IoT-based systems. Therefore, the increased deployment of …

A trustworthy, reliable, and lightweight privacy and data integrity approach for the Internet of Things

R Khan, J Teo, MA Jan, S Verma… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data integrity and authenticity are among the key challenges faced by the interacting
devices of Internet of Things (IoT). The resource-constrained nature of sensor-embedded …

Lightweight secure bootstrap and message attestation in the Internet of Things

C Gritti, R Molva, M Önen - Proceedings of the 33rd Annual ACM …, 2018 - dl.acm.org
Internet of Things (IoT) offers new opportunities for business, technology and science but it
also raises new challenges in terms of security and privacy, mainly because of the inherent …

APPS: Authentication-enabled privacy protection scheme for secure data transfer in Internet of Things

AK Ranjan, P Kumar - Ad Hoc Networks, 2024 - Elsevier
Abstract The Internet of Things (IoT) is an emerging field that encompasses several
heterogeneous devices and smart objects that are integrated with the network. In open …

Reliable and secure data transfer in IoT networks

SP Gochhayat, C Lal, L Sharma, DP Sharma, D Gupta… - Wireless …, 2020 - Springer
With the rapid technological improvements in mobile devices and their inclusion in Internet
of Things (IoT), secure key management becomes mandatory to ensure security of …

IoT security: To secure IoT devices with two-factor authentication by using a secure protocol

KB Jalbani, AH Jalbani, SS Soomro - Industrial Internet of Things …, 2020 - igi-global.com
The usage of the internet of things (IoT) devices is growing for the ease of life. From smart
homes to smart cars, from smart transportation to smart cities, from smart hospitals to smart …

P-hip: A lightweight and privacy-aware host identity protocol for internet of things

M Hossain, R Hasan - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The host identity protocol (HIP) has emerged as the most suitable solution to uniquely
identify smart devices in the mobile and distributed Internet-of-Things (IoT) systems, such as …

A robust device-to-device continuous authentication protocol for the internet of things

A Badhib, S Alshehri, A Cherif - IEEE Access, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is a heterogeneous environment that connects billions of
devices. Thus, it is a significantly high-value target for attackers and suffers from several …

A decentralized scalable security framework for end‐to‐end authentication of future IoT communication

PSF Sheron, KP Sridhar, S Baskar… - Transactions on …, 2020 - Wiley Online Library
The development of Internet of Things (IoT) has granted multiple interoperable features for
user to digital things communication. The future communication technology and service …