T2T-MAP: A PUF-based thing-to-thing mutual authentication protocol for IoT

K Lounis, M Zulkernine - IEEE Access, 2021 - ieeexplore.ieee.org
As security has always been an afterthought of innovation, the security of IoT (Internet of
Things), in general, and authentication, in particular, has become a serious research …

UAP: A unified authentication platform for IoT environment

F Hendaoui, H Eltaief, H Youssef - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) is a network that encompasses every physical object
being connected to the Internet. The IoT objects face several issues and challenges due to …

Rotating behind privacy: An improved lightweight authentication scheme for cloud-based IoT environment

SA Chaudhry, A Irshad, K Yahya, N Kumar… - ACM Transactions on …, 2021 - dl.acm.org
The advancements in the internet of things (IoT) require specialized security protocols to
provide unbreakable security along with computation and communication efficiencies …

A novel authentication protocol for iot-enabled devices

D He, Z Zhao, S Chan, M Guizani - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is composed of a large number of miniaturized devices
interconnected through the Internet. These devices, equipped with sensing, computing, and …

Physical unclonable function and hashing are all you need to mutually authenticate iot devices

A Mostafa, SJ Lee, YK Peker - Sensors, 2020 - mdpi.com
Internet of Things (IoT) has become the driving force in modern day technology with an
increasing and rapid urge to create an intelligent, efficient, and connected world. IoT is used …

[引用][C] Authentication Method for Safe Internet of Things Environments

YS Lee - The Journal of Korea Institute of …, 2015 - Korea Information Electronic …

Security Analysis of a Lightweight Identity‐Based Two‐Party Authenticated Key Agreement Protocol for IIoT Environments

Y Li, Q Cheng, W Shi - Security and Communication Networks, 2021 - Wiley Online Library
Internet of Things brings convenience to the social life, at the same time, putting forward
higher requirements for the security of data transmission and storage. Security incidents …

[HTML][HTML] Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems

OA Khashan, NM Khafajah - Journal of King Saud University-Computer and …, 2023 - Elsevier
With the rapid increase in the number of Internet of Things (IoT) devices in recent years,
massive amounts of sensitive IoT data are being generated and transmitted over the …

A distributed identity‐based authentication scheme for internet of things devices using permissioned blockchain system

ES Babu, AK Dadi, KK Singh, SR Nayak… - Expert …, 2022 - Wiley Online Library
Abstract The Internet of Things (IoT) has become a significant technology on the internet with
its widespread adoption in almost every place we could think of, like homes, hospitals …

A formally verified blockchain-based decentralised authentication scheme for the internet of things

K Hameed, S Garg, MB Amin, B Kang - The Journal of Supercomputing, 2021 - Springer
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT
devices is becoming a major concern as an attacker can exploit network services via …