Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model

S Amanlou, MK Hasan, KAA Bakar - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …

Development of a lightweight centralized authentication mechanism for the Internet of Things driven by fog

J Lansky, M Sadrishojaei, AM Rahmani, MH Malik… - Mathematics, 2022 - mdpi.com
The rapid development of technology has made the Internet of Things an integral element of
modern society. Modern Internet of Things' implementations often use Fog computing, an …

Development of an enhanced blockchain mechanism for internet of things authentication

M Sadrishojaei, F Kazemian - Wireless Personal Communications, 2023 - Springer
The rising number of Internet of Things devices across public networks bring speed,
accuracy, and responsibility. The complexity of Internet of Things communications and …

Mutual authentication with multi-factor in IoT-Fog-Cloud environment

L Loffi, CM Westphall, LD Grüdtner… - Journal of Network and …, 2021 - Elsevier
Authentication of restricted memory devices presents significant problems since memory
consumption is high in mutual authentication using cryptographic protocols in IoT …

STRIDE-based cyber security threat modeling for IoT-enabled precision agriculture systems

MR Al Asif, KF Hasan, MZ Islam… - 2021 3rd International …, 2021 - ieeexplore.ieee.org
The concept of traditional farming is changing rapidly with the introduction of smart
technologies like the Internet of Things (IoT). Under the concept of smart agriculture …

Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet‐of‐Things‐Fog environment

U Jain, S Pirasteh, M Hussain - Concurrency and Computation …, 2023 - Wiley Online Library
Security is a major challenge in the design and implementation of Internet‐of‐Things (IoT)‐
Fog networks and it can be resolved by an efficient authentication mechanism. As the …

High-performance multi-function HMAC-SHA2 FPGA implementation

B Kieu-Do-Nguyen, TT Hoang… - 2022 20th IEEE …, 2022 - ieeexplore.ieee.org
Today, Hash-based Message Authentication Code with Secure Hash Algorithm 2 (HMAC-
SHA2) is widely used in modern protocols, such as in Internet Protocol Security (IPSec) and …

A blockchain-based lightweight secure authentication and trust assessment framework for IoT devices in fog computing

NT Bajwa, A Anjum, MA Khan - … Quality of Life using AI, Robotics …, 2023 - ieeexplore.ieee.org
The IoT devices are used in everyday life and are connected to build a network. An
extensive amount of data is being shared among these devices. However, these devices are …

Spmac: Scalable prefix verifiable message authentication code for internet of things

H Yan, H Hu, Q Ye, L Tang - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
Internet of Things is a valuable tool in various application domains, including smart cities,
industrial production, healthcare, and so on. Every connected device can share messages …

Multi-hop sanitizable signature for collaborative edge computing

H Yan, H Hu, Q Ye, J Xu - Journal of Computer Security, 2024 - content.iospress.com
Edge computing is a significant paradigm that can provide message aggregation and
message verification with low time delay. To overcome the limitation of computation ability in …