Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

[HTML][HTML] Security and privacy issues of physical objects in the IoT: Challenges and opportunities

X Yao, F Farha, R Li, I Psychoula, L Chen… - Digital Communications …, 2021 - Elsevier
Abstract In the Internet of Things (IoT), security and privacy issues of physical objects are
crucial to the related applications. In order to clarify the complicated security and privacy …

A lightweight multicast authentication mechanism for small scale IoT applications

X Yao, X Han, X Du, X Zhou - IEEE Sensors Journal, 2013 - ieeexplore.ieee.org
Security is very important for Internet of Things (IoTs). As a main communication mode, the
security mechanism for multicast is not only the measure to ensure secured …

Efficient and secure ECDSA algorithm and its applications: A survey

M Al-Zubaidie, Z Zhang, J Zhang - arXiv preprint arXiv:1902.10313, 2019 - arxiv.org
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic
curve digital signature algorithm (ECDSA) have been attracting attention from many …

Fast authentication in wireless sensor networks

C Benzaid, K Lounis, A Al-Nemrat, N Badache… - Future Generation …, 2016 - Elsevier
Broadcast authentication is a fundamental security service in wireless sensor networks
(WSNs). Although symmetric-key-based μ TESLA-like schemes were employed due to their …

REISCH: Incorporating lightweight and reliable algorithms into healthcare applications of WSNs

M Al-Zubaidie, Z Zhang, J Zhang - Applied Sciences, 2020 - mdpi.com
Healthcare institutions require advanced technology to collect patients' data accurately and
continuously. The tradition technologies still suffer from two problems: performance and …

A survey of broadcast authentication schemes for wireless networks

K Grover, A Lim - Ad Hoc Networks, 2015 - Elsevier
With the increase in the usage of wireless networks and their applications where broadcast
transmission is widely used, it has become critical to authenticate broadcast messages …

Real-time digital signatures for time-critical networks

AA Yavuz, A Mudgerikar, A Singla… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
The secure and efficient operation of time-critical networks, such as vehicular networks,
smart-grid, and other smart-infrastructures, is of primary importance in today's society. It is …

LWDSA: light-weight digital signature algorithm for wireless sensor networks

M Lavanya, V Natarajan - Sādhanā, 2017 - Springer
The essential security mechanism in wireless sensor networks (WSNs) is authentication,
where nodes can authenticate each other before transmitting a valid data to a sink. There …

Dimensionality reduction for intrusion detection systems in multi-data streams—A review and proposal of unsupervised feature selection scheme

NY Almusallam, Z Tari, P Bertok, AY Zomaya - Emergent Computation: a …, 2017 - Springer
Abstract An Intrusion Detection System (IDS) is a security mechanism that is intended to
dynamically inspect traffic in order to detect any suspicious behaviour or launched attacks …