An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT

A Shahidinejad, J Abawajy - ACM Computing Surveys, 2024 - dl.acm.org
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …

Towards formal verification of IoT protocols: A Review

K Hofer-Schmitz, B Stojanović - Computer Networks, 2020 - Elsevier
Formal Verification is one of the crucial methods to detect possible weaknesses and
vulnerabilities at an early stage. This paper reviews formal methods for an extensive variety …

Internet of drones security and privacy issues: Taxonomy and open challenges

M Yahuza, MYI Idris, IB Ahmedy, AWA Wahab… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is a decentralized network and management framework that links
drones' access to the controlled airspace and provides inter-location navigation services …

Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT

H Abdi Nasib Far, M Bayat, A Kumar Das, M Fotouhi… - Wireless …, 2021 - Springer
Nowadays, wireless sensor networks (WSNs) are essential for monitoring and data
collection in many industrial environments. Industrial environments are usually huge. The …

Proverif with lemmas, induction, fast subsumption, and much more

B Blanchet, V Cheval, V Cortier - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
This paper presents a major overhaul of one the most widely used symbolic security protocol
verifiers, ProVerif. We provide two main contributions. First, we extend ProVerif with lemmas …

ALAM: Anonymous lightweight authentication mechanism for SDN-enabled smart homes

W Iqbal, H Abbas, P Deng, J Wan… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The smart connected devices are the first choice of cybercriminals for spreading spy wares
and different security attacks. The current security standards and protocols for Internet of …

Authentication in the internet of medical things: taxonomy, review, and open issues

N Alsaeed, F Nadeem - Applied Sciences, 2022 - mdpi.com
The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely
connecting patients to healthcare providers through medical devices connected over the …

Security in internet of drones: A comprehensive review

S Samanth, P KV, M Balachandra - Cogent Engineering, 2022 - Taylor & Francis
Abstract Unmanned Aerial Vehicles (UAVs), also called drones, are used for various
applications with two basic classifications: civilian and military drones. Civilian drones are …

Security-enhanced three-party pairwise secret key agreement protocol for fog-based vehicular ad-hoc communications

SA Eftekhari, M Nikooghadam, M Rafighi - Vehicular Communications, 2021 - Elsevier
The notion of fog-based vehicular ad-hoc network has been introduced by the integration of
fog-based computing paradigm into the conventional vehicular ad-hoc networks. This …