Enhanced authentication protocol for the Internet of Things environment

CM Chen, X Li, S Liu, ME Wu… - Security and …, 2022 - Wiley Online Library
The Internet of Things (IoT) is among the most promising technologies of the future, and its
development has garnered attention worldwide. However, the rise of the IoT has been …

Toward secure and provable authentication for Internet of Things: Realizing industry 4.0

S Garg, K Kaur, G Kaddoum… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) has many applications, including Industry 4.0. There are a
number of challenges when deploying IoT devices in the Industry 4.0 setting, partly due to …

Comments on “Toward secure and provable authentication for internet of things: realizing industry 4.0”

MA Akram, K Mahmood, S Kumari… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is the next era of communication networks. The concept of IoT is that
everything within the global communication network is interconnected and accessible. Since …

Secure Authentication Protocols For Internet Of Things (Iot) Devices

P William, A Shrivastava, N Tripathi… - 2023 6th International …, 2023 - ieeexplore.ieee.org
The ability to give typical gadgets an extra technique for distinguishing proof and
correspondence is known as the Internet of Things (IoT). The scope of IoT application …

Privacy-preserving machine authenticated key agreement for internet of things

B Kapito, M Nyirenda, H Kim - International Journal of Computer …, 2021 - papers.ssrn.com
Internet of things (IoT) is the integration of computer-based systems and the physical world
in which things interact with each other. Due to heterogeneity and resource-constrained …

A secure IoT-based authentication system in cloud computing environment

HL Wu, CC Chang, YZ Zheng, LS Chen, CC Chen - Sensors, 2020 - mdpi.com
The Internet of Things (IoT) is currently the most popular field in communication and
information techniques. However, designing a secure and reliable authentication scheme for …

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …

A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway

R Hajian, SH Erfani, S Kumari - The Journal of Supercomputing, 2022 - Springer
Focusing specifically on sensing devices with restricted resources, heterogeneous internet
of things (HIoT) is an attractive scenario for IoT networks. Nonetheless, the very nature of …

PLAKE: PUF-based secure lightweight authentication and key exchange protocol for IOT

S Roy, D Das, A Mondal, MH Mahalat… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is evolving as a ubiquitous technology to thrive human lives with
minimal time and effort. The resource-constrained IoT devices operating in an ambient …