Analysis and Improvement on an Authentication Protocol for IoT‐Enabled Devices in Distributed Cloud Computing Environment

B Kang, Y Han, K Qian, J Du - Mathematical Problems in …, 2020 - Wiley Online Library
Recently, a number of authentication protocols integrated with the Internet of Things (IoT)
and cloud computing have been proposed for secure access control on large‐scale IoT …

Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment

A Shahidinejad, M Ghobaei-Arani… - IEEE consumer …, 2021 - ieeexplore.ieee.org
Due to the ever-growing use of active Internet devices, the Internet has achieved good
popularity at present. The smart devices could connect to the Internet and communicate …

Authentication in internet of things: State of art

S Dargaoui, M Azrour, A El Allaoui, A Guezzaz… - Proceedings of the 6th …, 2023 - dl.acm.org
Internet of Things (IoT) is a system of wireless electronics that may visualize and control
much of the world that surrounds us. This new concept brings with it a broad range of …

An Improved Blockchain‐Based Authentication Protocol for IoT Network Management

M Yavari, M Safkhani, S Kumari… - Security and …, 2020 - Wiley Online Library
Communication security between IoT devices is a major concern in this area, and the
blockchain has raised hopes that this concern will be addressed. In the blockchain concept …

Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks

MT Al Ahmed, F Hashim, SJ Hashim, A Abdullah - Electronics, 2023 - mdpi.com
Internet of Things networks (IoT) are becoming very important in industrial, medical, and
commercial applications. The security aspect of IoT networks is critical, especially the …

Emerging security threats and countermeasures in IoT

ZK Zhang, MCY Cho, S Shieh - Proceedings of the 10th ACM symposium …, 2015 - dl.acm.org
IoT (Internet of Things) diversifies the future Internet, and has drawn much attention. As more
and more gadgets (ie Things) connected to the Internet, the huge amount of data exchanged …

A systematic security assessment and review of internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …

[PDF][PDF] Authentication Techniques in the Internet of Things Environment: A Survey.

S Hong - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
Abstract The Internet of Things (IoT) enables the offering of services specialized for each
client in real time by processing and analyzing the sensor information concerned after …

A physically secure, lightweight three-factor and anonymous user authentication protocol for IoT

Z Liu, C Guo, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things has remarkable effects in human's daily life. It is important for users and
sensors to securely access data collected by low-cost sensors via Internet in real-time IoT …

PUFDCA: A Zero‐Trust‐Based IoT Device Continuous Authentication Protocol

S Alshomrani, S Li - Wireless Communications and Mobile …, 2022 - Wiley Online Library
It is very challenging to secure the Internet of Things (IoT) systems, which demands an end‐
to‐end approach from the edge devices to cloud or hybrid service. The exponential growth …