IoT Authentication Protocols: Classification, Trend and Opportunities

AN Alsheavi, A Hawbani, X Wang… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
This paper reviews three main aspects of authentication protocols of Internet of Things (IoT):
classifications and limitations, current trends, and opportunities. First, we explore the …

A Problem Analysis of Smart Home Automation: Toward Secure and Usable Communication-based Authorisation

SW Tay, N Zhang, S AlJanah - IEEE Access, 2024 - ieeexplore.ieee.org
The advent of the Internet of Things (IoT) and Artificial Intelligence (AI) have led to the rising
popularity of Smart Home Automation (SHAuto). SHAuto uses a variety of interconnected …

Edge-enabled zero trust architecture for ICPS with spatial and temporal granularity

W Lei, Z Pang, H Wen, W Hou… - 2023 IEEE 6th …, 2023 - ieeexplore.ieee.org
Motivated by the rapid advancement of industrial cyber-physical systems (ICPS) and rising
voices in favor of zero trust (ZT) security, in this paper, we present an edge-enabled zero …

A Blockchain-Based Fox Optimization Algorithm for Optimizing and Securing Electrical Vehicles Charging

A Hamed, M Torky, S AlJanah… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The adoption of electric vehicles (EVs) is rapidly accelerating, driven by increased
environmental awareness and technological advancements. However, EV charging faces …

A Multi-Factor Homomorphic Encryption based Method for Authenticated Access to IoT Devices

S AlJanah, N Zhang, SW Tay - arXiv preprint arXiv:2307.03291, 2023 - arxiv.org
Authentication is the first defence mechanism in many electronic systems, including Internet
of Things (IoT) applications, as it is essential for other security services such as intrusion …

KESIC: Kerberos Extensions for Smart, IoT and CPS Devices

RT Prapty, S Jakkamsetti… - 2024 33rd International …, 2024 - ieeexplore.ieee.org
Secure and efficient multi-user access mechanisms are increasingly important for the
growing number of Internet of Things (IoT) devices being used today. Kerberos is a well …

Designing an Authentication Methodology in IoT Using Energy Consumption Patterns

EM Timofte, AL Balan, T Iftime - 2024 International Conference …, 2024 - ieeexplore.ieee.org
In this paper we are proposing an authentication method based on the energy usage
patterns of connected devices. This approach marks a step up from traditional security …

An Interaction based Multi-Factor Multi-Level Authentication Framework for IoT Environments

S AlJanah - 2022 - search.proquest.com
Abstract Internet of Things (IoT) applications, such as smart home, smart health, and
industrial IoT, are increasingly popular with the increased number and reduced cost of smart …

Security Engineering and Federated Learning for Healthcare Information Systems

IA Yari - 2024 - search.proquest.com
Digitalization revolutionizes healthcare by enabling seamless information access to
stakeholders, enhancing service efficiency, personalizing care, and bolstering online health …

IOT Based Locker Access System with MFA & Remote Authentication

TN Prabakar, K Vignesh, V Balaji… - … on Applications and …, 2024 - Springer
In this paper, a security mechanism that incorporates remote multifactor authentication [MFA]
for bank locker security and similar applications is presented. MFA requires authentication …