Understanding node capture attacks in user authentication schemes for wireless sensor networks

C Wang, D Wang, Y Tu, G Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Despite decades of intensive research, it is still challenging to design a practical multi-factor
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …

A secure three factor based authentication scheme for health care systems using IoT enabled devices

SS Sahoo, S Mohanty, B Majhi - Journal of Ambient Intelligence and …, 2021 - Springer
In recent years, the Internet of Things (IoT) has gained increasing popularity due to the
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …

[HTML][HTML] A lightweight three factor authentication framework for IoT based critical applications

M Saqib, B Jasra, AH Moon - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT is emerging as a massive web of heterogeneous networks estimated to interconnect
over 41 billion devices by 2025, generating around 79 zettabytes of data. The …

Security protocol using elliptic curve cryptography algorithm for wireless sensor networks

R Qazi, KN Qureshi, F Bashir, NU Islam, S Iqbal… - Journal of Ambient …, 2021 - Springer
Abstract Information security broadly refers to the state of protection against unsanctioned
access to information or data, principally electronic or digital data. In today's world of modern …

An efficient authentication and key agreement scheme based on ECDH for wireless sensor network

MF Moghadam, M Nikooghadam, MAB Al Jabban… - IEEE …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor
nodes, different types of controls, and gateway nodes. these kinds of networks are used as …

A lightweight secure user authentication and key agreement protocol for wireless sensor networks

J Mo, H Chen - Security and Communication Networks, 2019 - Wiley Online Library
Wireless sensor networks (WSNs) have great potential for numerous domains of application
because of their ability to sense and understand unattended environments. However, a …

A survey on privacy preservation in fog-enabled internet of things

K Sarwar, S Yongchareon, J Yu… - ACM Computing Surveys …, 2021 - dl.acm.org
Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical
challenges that need to be addressed before the full adoption of the IoT. Data privacy is one …

An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network

D Rangwani, D Sadhukhan, S Ray… - Transactions on …, 2021 - Wiley Online Library
Agriculture is a fundamental pillar of society, bearing a crucial role in shaping the economy
of the country and provides huge financial prospects and the possibility of employment to the …

An enhanced symmetric cryptosystem and biometric-based anonymous user authentication and session key establishment scheme for WSN

M Alotaibi - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are progressive ad hoc networks that comprise of
distributed sensors that are typically and randomly deployed over the target region. The …

A brief survey on IoT privacy: Taxonomy, issues and future trends

K Sarwar, S Yongchareon, J Yu - … , China, November 12–15, 2018, Revised …, 2019 - Springer
Abstract Internet of Things (IoT) is a paradigm that has the capability to revolutionize on
everyday life, in sectors of ranging from our homes, health, transport, industry, entertainment …