Smart grid metering networks: A survey on security, privacy and open research issues

P Kumar, Y Lin, G Bai, A Paverd… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Smart grid (SG) networks are newly upgraded networks of connected objects that greatly
improve reliability, efficiency, and sustainability of the traditional energy infrastructure. In this …

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2024 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Mutual authentication in IoT systems using physical unclonable functions

MN Aman, KC Chua, B Sikdar - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a great opportunity to connect people, information,
and things, which will in turn cause a paradigm shift in the way we work, interact, and think …

A secure authenticated and key exchange scheme for fog computing

CM Chen, Y Huang, KH Wang, S Kumari… - Enterprise Information …, 2021 - Taylor & Francis
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …

A mutual security authentication method for RFID-PUF circuit based on deep learning

W Liang, S Xie, D Zhang, X Li, KC Li - ACM Transactions on Internet …, 2021 - dl.acm.org
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process
controls, thereby leveraging improvements in economic benefits, such as efficiency and …

A privacy-preserving and scalable authentication protocol for the internet of vehicles

MN Aman, U Javaid, B Sikdar - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
One of the most important and critical requirements for the Internet of Vehicles (IoV) is
security under strict latency. Typically, authentication protocols for vehicular ad hoc networks …

LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT

SF Aghili, H Mala, M Shojafar, P Peris-Lopez - future generation computer …, 2019 - Elsevier
The use of the Internet of Things (IoT) in the electronic health (e-health) management
systems brings with it many challenges, including secure communications through insecure …

Design and analysis of lightweight authentication protocol for securing IoD

SU Jan, F Qayum, HU Khan - Ieee access, 2021 - ieeexplore.ieee.org
The Internet-of-drones (IoD) environment is a layered network control architecture designed
to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) …

Towards formal verification of IoT protocols: A Review

K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
Formal Verification is one of the crucial methods to detect possible weaknesses and
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …