Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2023 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …

Deep CNN model based on VGG16 for breast cancer classification

D Albashish, R Al-Sayyed, A Abdullah… - 2021 International …, 2021 - ieeexplore.ieee.org
Deep learning (DL) technologies are becoming a buzzword these days, especially for breast
histopathology image tasks, such as diagnosing, due to the high performance obtained in …

[HTML][HTML] Secure-user sign-in authentication for IoT-based eHealth systems

BD Deebak, F Al-Turjman - Complex & Intelligent Systems, 2023 - Springer
Sustainable Computing has advanced the technological evolution of the Internet and
information-based communication technology. It is nowadays emerging in the form of the …

On the security of the standardized MQV protocol and its based Evolution Protocols

Z Mohammad, V Nyangaresi… - 2021 International …, 2021 - ieeexplore.ieee.org
The MQV is an authenticated key agreement protocol which does not use any one-way hash
functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …

New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value

A Abusukhon, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Data encryption techniques are important for answering the question: How secure is the
Internet for sending sensitive data. Keeping data secure while they are sent through the …

A new model for security analysis of network anomalies for IoT devices

M Rawajbeh, W Alzyadat, K Kaabneh… - … Journal of Data and …, 2023 - growingscience.com
In the era of IoT gaining traction, attacks on IoT-enabled devices are the order of the day that
emanates the need for more protected IoT networks. IoT's key feature deals with massive …

Secret sharing-based authenticated key agreement protocol

P Dzurenda, S Ricci, RC Marqués, J Hajny… - Proceedings of the 16th …, 2021 - dl.acm.org
In this article, we present two novel authenticated key agreement (AKA) schemes that are
easily implementable and efficient even on constrained devices. Both schemes are …

Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther

Z Mohammad - International Journal of Communication …, 2020 - Wiley Online Library
Hao proposed the YAK as a robust key agreement based on public‐key authentication, and
the author claimed that the YAK protocol withstands all known attacks and therefore is …

Centralised and distributed authentication scheme in internet of things: review and outlook

U Verma, D Bhardwaj - International Journal of Internet …, 2022 - inderscienceonline.com
Internet of things (IoT) is the promising technology in which devices equipped with
processors, actuators and sensors communicate with each other to serve a meaningful …