Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker

JJ Puthiyidam, S Joseph, B Bhushan - The Journal of Supercomputing, 2024 - Springer
Advancements in computing and communication technology have increased the number of
devices connected to the Internet, leading to the emergence of the Internet of Things (IoT) …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …

[PDF][PDF] Lightweight security mechanism over MQTT protocol for IoT devices

S Amanlou, KAA Bakar - … Journal of Advanced Computer Science and …, 2020 - academia.edu
Security is one of the main concerns with regard to the Internet of Things (IoT) networks.
Since most IoT devices are restricted in resource and power consumption, it is not easy to …

ECC based inter-device authentication and authorization scheme using MQTT for IoT networks

A Lohachab - Journal of Information Security and Applications, 2019 - Elsevier
Abstract Internet of Things (IoT) has emerged from the proliferation of smart and inter-
connected devices ranging from tiny sensors to complex Fog and Cloud nodes, various …

Elliptic curve cryptography based security on mqtt system for smart home application

ZYM Yusoff, MK Ishak, LAB Rahim… - 2022 19th International …, 2022 - ieeexplore.ieee.org
Securing IoT networks has been one of recent most active research topics. However, unlike
traditional network security, where the emphasis is given on the core network, IoT networks …

Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model

S Amanlou, MK Hasan, KAA Bakar - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …

Efficient authentication of resource-constrained IoT devices based on ECQV implicit certificates and datagram transport layer security protocol

DA Ha, KT Nguyen, JK Zao - Proceedings of the 7th Symposium on …, 2016 - dl.acm.org
This paper introduces a design and implementation of a security scheme for the Internet of
Things (IoT) based on ECQV Implicit Certificates and Datagram Transport Layer Security …

Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme

M Nikooghadam, H Amintoosi - International Journal of …, 2023 - Wiley Online Library
Summary Internet of Things (IoT) is a newly emerged paradigm where multiple embedded
devices, known as things, are connected via the Internet to collect, share, and analyze data …

A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices

A Tewari, BB Gupta - International Journal of Advanced …, 2017 - inderscienceonline.com
The Internet-of-Things (IoT) is an evolving architecture which connects multiple devices to
internet for communication or receiving updates from a cloud or a server. In future, the …

L-ecqv: Lightweight ecqv implicit certificates for authentication in the internet of things

M Malik, M Dutta, J Granjal - IEEE Access, 2023 - ieeexplore.ieee.org
The vast expansion of the Internet of Things (IoT) devices and related applications has
bridged the gap between the physical and digital world. Unfortunately, security remains a …