Light: Lightweight authentication for intra embedded integrated electronic systems

X Li, D He, Y Gao, X Liu, S Chan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
As embedded integrated electronic systems (EIESs) become more pervasive (including in
mission-critical applications), the need to ensure the security of data exchange in such a …

[HTML][HTML] EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element

C Patel, AK Bashir, AA AlZubi, R Jhaveri - Digital Communications and …, 2023 - Elsevier
Abstract Industrial IoT (IIoT) aims to enhance services provided by various industries, such
as manufacturing and product processing. IIoT suffers from various challenges, and security …

A Robust ECC-Based Authentication and Key Agreement Protocol for 6G-Based Smart Home Environments

M Yuan, H Tan, W Zheng, P Vijayakumar… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
With the rapid evolution of wireless communication technology, smart homes have
significantly improved the quality of peoples daily lives by taking advantage of the low …

A privacy-preserved E2E authenticated key exchange protocol for multi-server architecture in edge computing networks

CL Hsu, TV Le, CF Lu, TW Lin, TH Chuang - IEEE Access, 2020 - ieeexplore.ieee.org
Edge computing has played an important role in enabling 5G technology which supports a
great number of connected narrow-band IoT devices. In an edge computing architecture …

Secure authenticated key exchange for WSNs in IoT applications

M Qi, J Chen - The Journal of Supercomputing, 2021 - Springer
Wireless sensor networks (WSNs) are the key technological building block of Internet of
Things (IoT), by which remote users can access the real-time data from the sensor nodes …

Securing IoT edge device communication with efficient ECC middleware for resource-constrained systems

ZYM Yusoff, MK Ishak, LAB Rahim - Bulletin of Electrical Engineering and …, 2024 - beei.org
The internet of things (IoT) rapidly grows into various parts of life. However, it has significant
obstacles during setup and deployment, particularly in terms of network segmentation …

Unbalancing pairing-free identity-based authenticated key exchange protocols for disaster scenarios

J Zhang, X Huang, W Wang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
In disaster scenarios, such as an area after a terrorist attack, security is a significant problem
since communications involve information for the rescue officers, such as polices, militaries …

ECC-based authenticated key agreement protocol for industrial control system

Y Chen, F Yin, S Hu, L Sun, Y Li, B Xing… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the
industrial control systems (ICSs) have been used extensively, which has brought more and …

A novel cross-layer authentication protocol for the Internet of Things

Y Lee, J Yoon, J Choi, E Hwang - IEEE Access, 2020 - ieeexplore.ieee.org
An innovative cross-layer authentication protocol that integrates cryptography-based
authentication and physical layer authentication (PLA) is proposed for massive cellular …

A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid

C Wang, P Huo, M Ma, T Zhou, Y Zhang - Computing, 2023 - Springer
With the gradual maturity of Smart Grid (SG), security challenges become the most important
issues that need to be addressed urgently. In recent years, many schemes adopt mutual …