An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT

A Shahidinejad, J Abawajy - ACM Computing Surveys, 2024 - dl.acm.org
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …

Blockchain-based multi-factor authentication: A systematic literature review

MS Almadani, S Alotaibi, H Alsobhi, OK Hussain… - Internet of Things, 2023 - Elsevier
Blockchain-based multi-factor authentication (BMFA) combines multi-factor authentication
with blockchain technology to provide a reliable and secure authentication mechanism. In …

Virtual-reality interpromotion technology for metaverse: A survey

D Wu, Z Yang, P Zhang, R Wang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The metaverse aims to build an immersive virtual reality world to support the daily life, work,
and recreation of people. In this survey, the status quo of the metaverse is investigated, and …

Secure multi-factor access control mechanism for pairing blockchains

AA Addobea, Q Li, IA Obiri Jr, J Hou - Journal of Information Security and …, 2023 - Elsevier
Digitalization has made it easier for centric systems to transition from single-factor to two-
factor authentication. However, several access control practices struggle to authenticate …

[HTML][HTML] Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture

K Mahmood, S Shamshad, MA Saleem… - Journal of Advanced …, 2024 - Elsevier
Abstract Introduction: The Industrial Internet of Things (IIoT) is a technology that connects
devices to collect data and conduct in-depth analysis to provide value-added services to …

Healthcare applications using blockchain with a cloud-assisted decentralized privacy-preserving framework

BD Deebak, SO Hwang - IEEE Transactions on Mobile …, 2023 - ieeexplore.ieee.org
In recent times, cloud-enabled healthcare services have gained much attention in fulfilling
the analysis of privacy risks associated with effective decision management systems …

Novel blockchain-integrated quantum-resilient self-certified authentication protocol for cross-industry communications

H Ghaemi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The Fourth Industrial Revolution (4IR) aims at improving the manufacturing cost and quality
by inter-connection of Industrial Internet of Things (IIoT) devices. In the 4IR, IIoT-based …

An enhanced multi-factor authentication and key agreement protocol in Industrial Internet of Things

Y Han, H Guo, J Liu, BB Ehui, Y Wu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is the application of the Internet of Things (IoT) in the
industrial field. IIoT allows users to remotely access industrial equipment and the data in it …

Decentralized lattice-based device-to-device authentication for the edge-enabled IoT

A Shahidinejad, J Abawajy - IEEE Systems Journal, 2023 - ieeexplore.ieee.org
In this article, we present a novel and decentralized authentication and key exchange
protocol for device-to-device (D2D) communications in the Internet of Things (IoT). The …

Efficient provably-secure authentication protocol for multi-domain IIoT using a combined off-chain and on-chain approach

A Shahidinejad, J Abawajy - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) has developed into a promising technology that raises
the level of productivity and automation for smart manufacturing. Due to the growing …