Systematic review of authentication and authorization advancements for the Internet of Things

M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny - Sensors, 2022 - mdpi.com
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate
their direction, leaving space for a plethora of research directions and opportunities. Among …

Efficient anonymous authentication based on physically unclonable function in industrial internet of things

Q Zhang, J Wu, H Zhong, D He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Owing to the open Industrial Internet of Things (IIoT) environment, information interacting
between devices and servers is transmitted over the public channel, which may lead to …

Efficient and anonymous cross-domain authentication for IIoT based on blockchain

J Cui, N Liu, Q Zhang, D He, C Gu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The rapid development of the Industrial Internet of Things (IIoT) has realized the intelligence
of industrial manufacturing and improved production efficiency. For improved collaboration …

Generative adversarial learning for trusted and secure clustering in industrial wireless sensor networks

L Yang, SX Yang, Y Li, Y Lu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Traditional machine learning techniques have been widely used to establish the trust
management systems. However, the scale of training dataset can significantly affect the …

Efficient batch authentication scheme based on edge computing in iiot

J Cui, F Wang, Q Zhang, C Gu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In the industrial Internet of Things (IIoT) environment (eg, a smart factory), smart devices with
limited computing power can bring large amounts of privacy-sensitive data into insecure …

Lightweight and anonymous mutual authentication protocol for edge IoT nodes with physical unclonable function

H Wang, J Meng, X Du, T Cao… - Security and …, 2022 - Wiley Online Library
Internet of Things (IoT) has been widely used in many fields, bringing great convenience to
people's traditional work and life. IoT generates tremendous amounts of data at the edge of …

An anonymous and outsourcing-supported multiauthority access control scheme with revocation for edge-enabled IIoT system

J Cui, F Bian, H Zhong, Q Zhang, S Xu… - IEEE Systems …, 2022 - ieeexplore.ieee.org
With the application of the Internet of Things and intelligent technologies in industrial
systems, the manufacturing efficiency and product quality have been improved, leading to …