Secure multifactor authenticated key agreement scheme for industrial IoT

R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The application of Internet of Things (IoT) has generally penetrated into people's life and
become popular in recent years. The IoT devices with different functions are integrated and …

[PDF][PDF] Review of cyber attack detection: Honeypot system

MR Amal, P Venkadesh - Webology, 2022 - webology.org
The number of connected devices in the network is growing day by day, and as the number
of linked devices grows, so will the number of cyberattacks. All devices connected to the …

Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing

BD Deebak, ALT Fadi - Future generation computer systems, 2021 - Elsevier
Numerous application domains in practice related to target-tracking, monitoring, and
transportation have utilized the wide usage of Wireless Sensor Networks (WSN's) …

A Review on Authentication Protocol and ECC in IOT

A Srivastava, A Kumar - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is a modern computing model that refers to interconnected
physical devices or IoT devices containing sensors, actuators and networking, so that these …

[HTML][HTML] Real-time monitoring for sport and mental health prevention of college student based on wireless sensor network

J Zhu - Preventive Medicine, 2023 - Elsevier
This article uses wireless sensor network technology to freely combine multiple sensor
nodes to achieve, but the scale and capacity of WSN internal nodes are limited, so it is …

Secure message transmission for V2V based on mutual authentication for VANETs

J Mahmood, Z Duan, H Xue, Y Yang… - Wireless …, 2021 - Wiley Online Library
The advancements in Vehicular Ad Hoc Networks (VANETs) require more intelligent security
protocols that ultimately provide unbreakable security to vehicles and other components of …

[HTML][HTML] Secure session key pairing and a lightweight key authentication scheme for liable drone services

R SC, K KR - Cyber Security and Applications, 2023 - Elsevier
Recent advancements in drone technology have created new application opportunities,
particularly for small drones. However, these advancements raise concerns about security …

Security and privacy analysis of Vinoth et al.'s authenticated key agreement scheme for industrial IoT

DZ Sun - Symmetry, 2021 - mdpi.com
Vinoth et al. proposed an authenticated key agreement scheme for industrial IoT (Internet of
Things) applications. Vinoth et al.'s scheme aimed to protect the remote sensing data of …

Security analysis on “anonymous authentication scheme for smart home environment with provable security”

M Xu, Q Dong, M Zhou, C Wang… - … and Mobile Computing, 2020 - Wiley Online Library
As an important application of the Internet of Things, smart home has greatly facilitated our
life. Since the communication channels of smart home are insecure and the transmitted data …

Centralised and distributed authentication scheme in internet of things: review and outlook

U Verma, D Bhardwaj - International Journal of Internet …, 2022 - inderscienceonline.com
Internet of things (IoT) is the promising technology in which devices equipped with
processors, actuators and sensors communicate with each other to serve a meaningful …