Current research trends in IoT security: a systematic mapping study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

REPS-AKA5: A robust group-based authentication protocol for IoT applications in LTE system

MA Mobarhan, M Salamah - Internet of Things, 2023 - Elsevier
Abstract Nowadays, Internet of Things systems connect several smart devices to provide
required services. The IoT applications employ Machine Type Communications to meet the …

A formally validated authentication algorithm for secure message forwarding in smart home networks

VO Nyangaresi - SN Computer Science, 2022 - Springer
The many devices connected in smart homes increase the attack surfaces from which
adversaries can invade the network. In addition, majority of these smart devices have …

A secure authentication scheme for IoT application in smart home

P Kumar, L Chouhan - Peer-to-Peer Networking and Applications, 2021 - Springer
The edge-based Internet of Things (IoT) computing provides a new value for the consumer
where the smart devices, objects, and appliances connected over the internet. The data …

Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System

CI Fan, YT Shih, JJ Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The fifth-generation mobile network (5G) integrates various application services in a
heterogeneous network environment. Compared to the traditional networks, 5G is not just an …

A deep learning-based authentication protocol for IoT-enabled LTE systems

ASV Rao, PK Roy, T Amgoth, A Bhattacharya - Future Generation …, 2024 - Elsevier
The connected devices in Internet-of-Things (IoT)-enabled systems are continuously
increasing nowadays, and likely to grow exponentially worldwide in near future. Hence, the …

An LTE authentication and key agreement protocol based on the ECC self-certified public key

X Lu, F Yang, L Zou, P Lio, P Hui - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
After analyzing the long-term evolution (LTE) authentication and key agreement process
(EPS-AKA), its existing security vulnerabilities are pointed out. Based on elliptic curve …

The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks

T Fei, W Wang - Computer Networks, 2023 - Elsevier
Abstract The Long-Term Evolution (LTE)/5G network connects much of the world's
population to provide subscriber's voice calls and mobile data delivery, with security …

REPS-AKA3: A secure authentication and re-authentication protocol for LTE networks

MA Mobarhan, M Salamah - Journal of Network and Computer Applications, 2022 - Elsevier
Key agreement and authentication are the most significant phases in LTE systems since
many malicious attacks may occur in these systems. For this reason, the LTE system …

[HTML][HTML] A framework for application-centric Internet of Things authentication

N Shingari, B Mago - Results in Engineering, 2024 - Elsevier
Abstract The Internet of Things (IoT) has various security needs due to its diversified data
management and application support. IoT processing platforms provide security guidelines …