A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

Memristive hyperchaotic system-based complex-valued artificial neural synchronization for secured communication in Industrial Internet of Things

MZ Khan, A Sarkar, A Noorwali - Engineering Applications of Artificial …, 2023 - Elsevier
In this article, a memristive hyperchaotic system-based complex-valued Artificial Neural
Network (ANN) synchronization for secured communication between Industrial Internet of …

Secure architecture for Industrial Edge of Things (IEoT): A hierarchical perspective

P Li, J Xia, Q Wang, Y Zhang, M Wu - Computer Networks, 2024 - Elsevier
Abstract The Industrial Internet of Things (IIoT) is an application of the IoT specifically
tailored for industrial manufacturing, characterized by its heightened requirements for …

A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid

Y Wu, H Guo, Y Han, S Li, J Liu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the enablement of Internet of Things technology, the electrical grid is currently
undergoing a drastic revolution, which is known as smart grid. Since massive sensitive data …

Reliable low-cost data transmission in smart grid system

S Jebri, AB Amor, S Zidi - Computer Communications, 2024 - Elsevier
Abstract The Smart Grid (SG) designates an electrical energy distribution system that
automatically and autonomously adapts production to demand. To achieve this balance, the …

A Blockchain-Based Authentication Scheme for Energy Trading in Electric Transportation

X Huang, R Cheng, J Wu, Q Guo… - … on Smart Grid, 2024 - ieeexplore.ieee.org
Authentication between Electric Vehicle (EV) users and Battery Charging/Switching (BCS)
stations is a significant problem for energy trading. Although there are many existing …

An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme

D Xie, J Yang, B Wu, W Bian, F Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In a mobile edge computing environment, the computing tasks of resource-constrained IoT
devices are often offloaded to mobile edge computing servers for processing. In order to …

User security authentication protocol in multi gateway scenarios of the Internet of Things

J Zhao, F Huang, H Hu, L Liao, D Wang, L Fan - Ad Hoc Networks, 2024 - Elsevier
Abstract 5G technology has been applied and popularized, leading to the widespread usage
of the Internet of Things (IoT) in various areas such as intelligent transportation, home …

SPCL: A Smart Access Control System That Supports Blockchain

J Wu, N Xue, Z Li, X Hong, Y Zhao, X Huang, J Zhang - Applied Sciences, 2024 - mdpi.com
The access control system is a critical element in intelligent buildings. In this paper, we
present SPCL, an innovative access control system designed to facilitate building entry …

Security assessment and improvement of smart grid NIKE protocol

T Feng, W Jin, M Zhang, L Zheng - International Journal of Information …, 2024 - Springer
Advanced metering infrastructure (AMI) is a fundamental functional module of Smart Grid
that supports mutual communication between customers and electric companies. In order to …