Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

Survey on iot multi-factor authentication protocols: A systematic literature review

ZAAM Fneish, M El-Hajj… - 2023 11th International …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of physical objects that is equipped with computers,
electronics, applications, sensors, and other devices. As the number of IoT devices and apps …

Secure multi‐factor remote user authentication scheme for Internet of Things environments

PK Dhillon, S Kalra - International Journal of Communication …, 2017 - Wiley Online Library
Because of the exponential growth of Internet of Things (IoT), several services are being
developed. These services can be accessed through smart gadgets by the user at any …

A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things

M Nikravan, A Reza - Wireless Personal Communications, 2020 - Springer
Abstract The Internet of Things (IoT) presents a new paradigm of the future internet that
intends to provide interactive communication between various processing object via …

Authentication techniques for the internet of things: A survey

M Saadeh, A Sleit, M Qatawneh… - 2016 cybersecurity …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT) consists of a large number of connected objects that are
communicating with each other. In order to support trusted communication between IoT …

Risk-based adaptive authentication for internet of things in smart home eHealth

MT Gebrie, H Abie - Proceedings of the 11th European Conference on …, 2017 - dl.acm.org
Health care is one of the primary beneficiaries of the technological revolution created by
Internet of Things (IoT). In the implementation of health care with IoT, wireless body area …

Low-overhead remote user authentication protocol for IoT based on a fuzzy extractor and feature extraction

BH Taher, S Jiang, AA Yassin, H Lu - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of things (IoT) is a system of smart technologies and services that mutually
communicate data between users and devices or between devices via the Internet. Since …

A lightweight hierarchical authentication scheme for internet of things

A Akbarzadeh, M Bayat, B Zahednejad… - Journal of Ambient …, 2019 - Springer
Abstract The Internet of Things (IoT) technology enables numerous things with different
processing power and storage capacity to communicate and share data with each other …

A novel secure authentication scheme for heterogeneous internet of things

J Liu, A Ren, L Zhang, R Sun, X Du… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Today, Internet of Things (IoT) technology is being increasingly popular which is applied in a
wide range of industry sectors such as healthcare, transportation and some critical …

[HTML][HTML] A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing

W Zhu, X Chen, L Jiang - Alexandria Engineering Journal, 2024 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a pivotal driving force behind the intelligent
transformation of the global industrial system, bringing about a gradual shift in production …