[HTML][HTML] A robust, low-cost and secure authentication scheme for IoT applications

MJ Mahmod, U Guin - Cryptography, 2020 - mdpi.com
The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly
susceptible to piracy. These pirated edge devices pose a serious threat to security, as an …

[HTML][HTML] An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances

R Martínez-Peláez, H Toral-Cruz, JR Parra-Michel… - Sensors, 2019 - mdpi.com
With the rapid deployment of the Internet of Things and cloud computing, it is necessary to
enhance authentication protocols to reduce attacks and security vulnerabilities which affect …

[HTML][HTML] An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture

H Huang, S Lu, Z Wu, Q Wei - EURASIP Journal on Wireless …, 2021 - Springer
With the widespread use of Internet of Things and cloud computing in smart cities, various
security and privacy challenges may be encountered. The most basic problem is …

Lightweight IoT-based authentication scheme in cloud computing circumstance

L Zhou, X Li, KH Yeh, C Su, W Chiu - Future generation computer systems, 2019 - Elsevier
Recently, authentication technologies integrated with the Internet of Things (IoT) and cloud
computing have been promptly investigated for secure data retrieval and robust access …

[HTML][HTML] IAKA-CIOT: An improved authentication and key agreement scheme for cloud enabled internet of things using physical unclonable function

K Park, Y Park - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) with cloud services are important functionalities in the latest IoT
systems for providing various convenient services. These cloud-enabled IoT environments …

Mutual authentication in IoT systems using physical unclonable functions

MN Aman, KC Chua, B Sikdar - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a great opportunity to connect people, information,
and things, which will in turn cause a paradigm shift in the way we work, interact, and think …

Lightweight multi-factor mutual authentication protocol for IoT devices

R Melki, HN Noura, A Chehab - International Journal of Information …, 2020 - Springer
Abstract The Internet-of-Things (IoT), which refers to the interconnection of heterogeneous
devices, has gained a lot of interest lately, and it witnessed a large growth in the number of …

Improved Secure and Lightweight Authentication Scheme for Next‐Generation IoT Infrastructure

CM Chen, S Liu - Security and Communication Networks, 2021 - Wiley Online Library
The Internet of Things (IoT) is a huge network formed by connecting various information
sensing devices through the Internet. Although IoT has been popularized in many fields …

[HTML][HTML] A privacy-preserving authentication and key agreement scheme with deniability for IoT

Y Zhou, T Liu, F Tang, F Wang, M Tinashe - Electronics, 2019 - mdpi.com
User authentication for the Internet of Things (IoT) is a vital measure as it consists of
numerous unattended connected devices and sensors. For security, only the user …

[HTML][HTML] Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

TY Wu, F Kong, Q Meng, S Kumari… - EURASIP Journal on …, 2023 - Springer
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have
gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with …