Privacy-preserving machine authenticated key agreement for internet of things

B Kapito, M Nyirenda, H Kim - International Journal of Computer …, 2021 - papers.ssrn.com
Internet of things (IoT) is the integration of computer-based systems and the physical world
in which things interact with each other. Due to heterogeneity and resource-constrained …

A survey of authenticated Key Agreement Protocols for securing IoT

Z Mohammad, A Abusukhon… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is defined as an inanimate object which is designed with built-in
wireless connectivity, and monitored, controlled and linked over the internet. As any new …

Enhanced authentication protocol for the Internet of Things environment

CM Chen, X Li, S Liu, ME Wu… - Security and …, 2022 - Wiley Online Library
The Internet of Things (IoT) is among the most promising technologies of the future, and its
development has garnered attention worldwide. However, the rise of the IoT has been …

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

Security Analysis of a Lightweight Identity‐Based Two‐Party Authenticated Key Agreement Protocol for IIoT Environments

Y Li, Q Cheng, W Shi - Security and Communication Networks, 2021 - Wiley Online Library
Internet of Things brings convenience to the social life, at the same time, putting forward
higher requirements for the security of data transmission and storage. Security incidents …

Secure Authentication Protocols For Internet Of Things (Iot) Devices

P William, A Shrivastava, N Tripathi… - 2023 6th International …, 2023 - ieeexplore.ieee.org
The ability to give typical gadgets an extra technique for distinguishing proof and
correspondence is known as the Internet of Things (IoT). The scope of IoT application …

Toward secure and provable authentication for Internet of Things: Realizing industry 4.0

S Garg, K Kaur, G Kaddoum… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) has many applications, including Industry 4.0. There are a
number of challenges when deploying IoT devices in the Industry 4.0 setting, partly due to …

ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment

BA Alzahrani, SA Chaudhry, A Barnawi, W Xiao… - Journal of Ambient …, 2022 - Springer
Abstract In 2019, Banerjee et al.(IEEE Int Things J 6 (5): 8739–8752, 2019; https://doi.
org/10.1109/JIOT. 2019.2931372) proposed an authenticated key agreement scheme to …

[PDF][PDF] Privacy-preserving authentication and key exchange mechanisms in internet of things applications

G Singh - 2021 - researchgate.net
Research Area: The Internet of Things (IoT) technology has emerged as the leader in
simplifying lives. The IoT is rapidly adopted by the various industries for faster data …

Pakit: Proactive authentication and key agreement protocol for internet of things

SF Aghili, H Mala, M Shojafar… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) holds great promise for many life-improving applications like health-
care systems. In IoT systems, providing secure authentication and key agreement scheme …