In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied …
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical applications including smart home, smart city, smart grid, industrial Internet, connected …
X Li, J Niu, S Kumari, F Wu, AK Sangaiah… - Journal of Network and …, 2018 - Elsevier
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing and control across heterogeneous network a reality, and has good prospects in industrial …
The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …
D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data access in industrial wireless sensor networks (WSNs). However, more often than not, the …
Q Jiang, S Zeadally, J Ma, D He - Ieee Access, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity …
F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu… - Future Generation …, 2018 - Elsevier
Abstract Wireless Sensor Network (WSN) is a very important part of Internet of Things (IoT), especially in e-healthcare applications. Among them, wireless medical sensor networks …
Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
P Gope, T Hwang - IEEE Transactions on industrial electronics, 2016 - ieeexplore.ieee.org
User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since the sensor nodes are equipped with …