[HTML][HTML] A three-factor anonymous user authentication scheme for Internet of Things environments

H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee - Journal of Information …, 2020 - Elsevier
To accelerate the deployment of fifth-generation (5G) cellular networks, millions of devices
are being connected to massive Internet of Things (IoT) networks. However, advances in the …

A secure, lightweight, and anonymous user authentication protocol for IoT environments

S Son, Y Park, Y Park - Sustainability, 2021 - mdpi.com
The Internet of Things (IoT) is being applied to various environments such as telecare
systems, smart homes, and intelligent transportation systems. The information generated …

E-AUA: An efficient anonymous user authentication protocol for mobile IoT

X Zeng, G Xu, X Zheng, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The emergence of the mobile Internet of Things (IoT) has made our lives smarter, relying on
its various mobile IoT devices and services provided. However, with the explosively …

An anonymous two-factor authentication protocol for IoT-based applications

MJ Sadri, MR Asaar - Computer Networks, 2021 - Elsevier
Internet of things (IoT) allows people to establish a real-time connection with physical
objects. To fulfill this lifelong ambition, the infrastructure of Wireless Sensor Networks …

A physically secure, lightweight three-factor and anonymous user authentication protocol for IoT

Z Liu, C Guo, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things has remarkable effects in human's daily life. It is important for users and
sensors to securely access data collected by low-cost sensors via Internet in real-time IoT …

Secure Three‐Factor Anonymous User Authentication Scheme for Cloud Computing Environment

H Lee, D Kang, Y Lee, D Won - Wireless Communications and …, 2021 - Wiley Online Library
Cloud computing provides virtualized information technology (IT) resources to ensure the
workflow desired by user at any time and location; it allows users to borrow computing …

A secure and lightweight authentication scheme for next generation IoT infrastructure

M Rana, A Shafiq, I Altaf, M Alazab, K Mahmood… - Computer …, 2021 - Elsevier
While the 6G/IoT transition is on the cards, the real advantage of this transition can be
realized only if the user privacy and security are guaranteed. The smartcard and password …

On the security of a secure and lightweight authentication scheme for next generation IoT infrastructure

AK Das, B Bera, M Wazid, SS Jamal, Y Park - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, the Internet of things (IoT) has become an encouraging communication
paradigm that has numerous applications including smart city, smart home and intelligent …

Efficient anonymous authentication based on physically unclonable function in industrial Internet of Things

Q Zhang, J Wu, H Zhong, D He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Owing to the open Industrial Internet of Things (IIoT) environment, information interacting
between devices and servers is transmitted over the public channel, which may lead to …

A lightweight anonymous user authentication and key establishment scheme for wearable devices

A Gupta, M Tripathi, TJ Shaikh, A Sharma - Computer Networks, 2019 - Elsevier
The paradigm of the Internet of Things (IoT) is a system of interconnected objects that can be
accessed globally with the help of the Internet. IoT has numerous applications including …