Biometrics for internet-of-things security: A review

W Yang, S Wang, NM Sahri, NM Karie, M Ahmed… - Sensors, 2021 - mdpi.com
The large number of Internet-of-Things (IoT) devices that need interaction between smart
devices and consumers makes security critical to an IoT environment. Biometrics offers an …

A survey on internet of things: Applications, recent issues, attacks, and security mechanisms

G Uganya, Radhika, N Vijayaraj - Journal of Circuits, Systems and …, 2021 - World Scientific
The Internet of Things (IoT) is a series of recording devices, mechanical and automated
machines, documents, creatures, or individuals that have one of the user identifiers and the …

A lightweight and conditional privacy-preserving authenticated key agreement scheme with multi-TA model for fog-based VANETs

L Wei, J Cui, H Zhong, I Bolodurina… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Recently, the fog computing concept has been introduced into vehicular ad-hoc networks
(VANETs) to formulate fog-based VANETs. Since the communication channels between …

Provably Secure Client‐Server Key Management Scheme in 5G Networks

L Yang, YC Chen, TY Wu - Wireless Communications and …, 2021 - Wiley Online Library
The increasing demand for real‐time data transmission in wireless mobile communication
networks has promoted the maturity of mobile communication technology. Fifth‐generation …

An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture

H Huang, S Lu, Z Wu, Q Wei - EURASIP Journal on Wireless …, 2021 - Springer
With the widespread use of Internet of Things and cloud computing in smart cities, various
security and privacy challenges may be encountered. The most basic problem is …

[HTML][HTML] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

J Wang, Y Zhu, S Maqbool - Digital Communications and Networks, 2021 - Elsevier
During the past decade, rapid advances in wireless communication technologies have
made it possible for users to access desired services using hand-held devices. Service …

An efficient user authentication and session key agreement in wireless sensor network using smart card

C Chunka, S Banerjee, RS Goswami - Wireless Personal Communications, 2021 - Springer
Securely accessing the information from sensor nodes is the premier need and becomes the
challenging area in wireless sensor networks (WSNs) and internet of things environment …

A secure and improved multi server authentication protocol using fuzzy commitment

HU Rehman, A Ghani, SA Chaudhry… - Multimedia Tools and …, 2021 - Springer
The advancement in communication and computation technologies has paved a way for
connecting large number of heterogeneous devices to offer specified services. Still, the …

A reliable lightweight two factor mutual authenticated session key agreement protocol for multi-server environment

S Shunmuganathan - Wireless Personal Communications, 2021 - Springer
Today's hyper-connected digital environment makes two-way authentication and secured
key agreement a fundamental requirement for a secure connection. The research …

A biometric based remote user authentication technique using smart card in multi-server environment

S Kandar, S Pal, BC Dhara - Wireless Personal Communications, 2021 - Springer
Remote user authentication is an efficient technique to perform secure communication over
an insecure network. In this current research article, a lightweight remote user authentication …