Blockchain-based decentralized authentication modeling scheme in edge and IoT environment

M Zhaofeng, M Jialin, W Jihui… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Authentication is the first entrance to kinds of information systems; however, traditional
centered single-side authentication is weak and fragile, which has security risk of single-side …

A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks

P Gope, T Hwang - IEEE Transactions on industrial electronics, 2016 - ieeexplore.ieee.org
User authentication in wireless sensor networks (WSN) is a critical security issue due to their
unattended and hostile deployment in the field. Since the sensor nodes are equipped with …

Medium access control techniques in M2M communication: survey and critical review

F Hussain, A Anpalagan… - Transactions on …, 2017 - Wiley Online Library
Abstract Machine‐to‐machine (M2M) communication has received increasing attention in
recent year. An M2M network exhibits some salient features such as large number of …

Design of a secure password-based authentication scheme for M2M networks in IoT enabled cyber-physical systems

KM Renuka, S Kumari, D Zhao, L Li - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an
efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT …

Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society

K Saleem, A Derhab, J Al-Muhtadi… - Computers in Human …, 2015 - Elsevier
In this paper, we propose a Machine to Machine (M2M) Low Cost and Secure (LCS)
communication system for e-Healthcare society. The system is designed to take into …

Extended group-based verification approach for secure M2M communications

T Prabhakara Rao, B Satyanarayana Murthy - International Journal of …, 2023 - Springer
The M2M communication is a most widely used technology that can use both reliable and
unreliable communication mechanism. We propose an efficient and group based strict …

A security authentication scheme in machine‐to‐machine home network service

X Sun, S Men, C Zhao, Z Zhou - Security and Communication …, 2015 - Wiley Online Library
Abstract Machine‐to‐machine (M2M) techniques have significant application potential in the
emerging internet of things, which may cover many fields from intelligence to ubiquitous …

An authentication scheme with identity‐based cryptography for M2M security in cyber‐physical systems

S Chen, M Ma, Z Luo - Security and Communication Networks, 2016 - Wiley Online Library
The Internet has made the world smaller while there is still a gap between the cyber world
and our physical world. In the future cyber‐physical system (CPS), all objects in cyber world …

The computer for the 21st century: present security & privacy challenges

LB Oliveira, FMQ Pereira, R Misoczki… - Journal of Internet …, 2018 - Springer
Decades went by since Mark Weiser published his influential work on the computer of the
21st century. Over the years, some of the UbiComp features presented in that paper have …

An authentication and authorization infrastructure for the web of things

MC Domenech, A Boukerche… - Proceedings of the 12th …, 2016 - dl.acm.org
Due to the distributed feature of the Web of Things (WoT) and its heterogeneous and
constrained devices, it is a challenge to provide authentication and authorization …