Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

M Turkanović, B Brumen, M Hölbl - Ad Hoc Networks, 2014 - Elsevier
The idea of the Internet of Things (IOT) notion is that everything within the global network is
accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in …

Survey of secure multipath routing protocols for WSNs

SM Zin, NB Anuar, MLM Kiah, I Ahmedy - Journal of Network and Computer …, 2015 - Elsevier
In sensing data to the base station, wireless sensor networks (WSNs) face some security
challenges since such networks impose resource constraints that need to be addressed by …

From MANET to people-centric networking: Milestones and open research challenges

M Conti, C Boldrini, SS Kanhere, E Mingozzi… - Computer …, 2015 - Elsevier
In this paper, we discuss the state of the art of (mobile) multi-hop ad hoc networking with the
aim to present the current status of the research activities and identify the consolidated …

Performance evaluation of cryptographic algorithms over IoT platforms and operating systems

GCCF Pereira, RCA Alves, FL Silva… - Security and …, 2017 - Wiley Online Library
The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices
brings significant processing and energy consumption overheads. These overheads are …

Lightweight and escrow-less authenticated key agreement for the internet of things

MA Simplicio Jr, MVM Silva, RCA Alves… - Computer …, 2017 - Elsevier
Security is essential for wide wireless sensor network (WSN) deployments, such as the
Internet of Things (IoT). However, the resource-constrained nature of sensors severely …

An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks

WL Tai, YF Chang, WH Li - Journal of Information Security and Applications, 2017 - Elsevier
In 2014, Turkanović et al. applied the Internet of Things (IoT) notion to wireless sensor
networks (WSNs) and proposed a user authentication and key agreement scheme for …

UCFL: User categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices

AK Das, S Kalam, N Sahar, D Sinha - Computers & Security, 2020 - Elsevier
Abstract Internet of Things (IoT) makes the daily life easier by increasing the connectivity
between the devices. The increase in number of connected devices makes the network …

Internet of everything and everybody: Architecture and service virtualization

M Younis - Computer Communications, 2018 - Elsevier
The impact of advanced communication and networking technologies spans all aspects of
our life and is visible in the way people interact, shop, do business, etc. This article reflects …

Electrocardiogram signals-based user authentication systems using soft computing techniques

M Hosseinzadeh, B Vo, MY Ghafour… - Artificial Intelligence …, 2021 - Springer
With the advent of various security attacks, biometric authentication methods are gaining
momentum in the security literature. Electrocardiogram or ECG signals are one of the …