An efficient authentication and key agreement scheme based on ECDH for wireless sensor network

MF Moghadam, M Nikooghadam, MAB Al Jabban… - IEEe …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor
nodes, different types of controls, and gateway nodes. these kinds of networks are used as …

An improved privacy preserving remote user authentication scheme for agricultural wireless sensor network

D Rangwani, D Sadhukhan, S Ray… - Transactions on …, 2021 - Wiley Online Library
Agriculture is a fundamental pillar of society, bearing a crucial role in shaping the economy
of the country and provides huge financial prospects and the possibility of employment to the …

Current research on Internet of Things (IoT) security protocols: A survey

R Mishra, A Mishra - Computers & Security, 2025 - Elsevier
Abstract The Internet of Things (IoT) has become indispensable for remote monitoring,
integrating diverse hardware and software elements to provide seamless, secure, and …

Privacy-preserving three-factor authentication protocol for wireless sensor networks deployed in agricultural field

MN Fatima, MS Obaidat, K Mahmood… - ACM Transactions on …, 2023 - dl.acm.org
The agriculture is the backbone of economic system, and it plays an essential part in the
survival of a nation's prosperity. In addition to providing raw materials and food, it also offers …

Evaluating authentication schemes for real-time data in wireless sensor network

D Singh, B Kumar, S Singh, S Chand - Wireless Personal Communications, 2020 - Springer
There have been discussed many user authentication schemes for wireless sensor
networks. This paper intends to review the existing authentication techniques for their pros …

Understanding the security failures of four user authentication schemes for wireless sensor networks in IoT environment

G Tyagi, R Kumar - International Journal of Computers and …, 2024 - Taylor & Francis
User authentication protocols are applied to provide a secure conversation between
participating entities in wireless sensor networks (WSNs). To identify how to ensure security …

Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem

G Tyagi, R Kumar - Peer-to-Peer Networking and Applications, 2023 - Springer
To formulate a secure and efficient user authentication scheme for wireless sensor networks
(WSNs) is a complicated task, because sensors are placed in unattended locations and …

Privacy preserving password-based multi-server authenticated key agreement protocol using smart card

D Mishra, S Dhal - Wireless Personal Communications, 2018 - Springer
Clint–server based communication mechanism provides climbable environment for online
services, where a user can obtain several services at any time and from anywhere via …

Avaliação de conformidade de requisitos de autenticação em gateways IOT

DR Gomes, EF Felix - 2022 - search.proquest.com
A Internet das Coisas é uma das novas tendências tecnológicas que vem chamando
atenção pela sua rápida disseminação e aceitação. No entanto, não saber se, por exemplo …

[PDF][PDF] Critical Security Mechanism Designed for Data Transmission in Wireless Sensor Networks using Hierarchical Cloud Server

PLK Reddy, KR Reddy - 2019 - academia.edu
The rapid advancement of pervasive computing, IoT and wearable systems, given rise to low-
power internetbased systems in elimination of distance complications by application of …