[HTML][HTML] Key agreement and authentication protocols in the Internet of Things: A survey

S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …

[HTML][HTML] Sakap: Sgx-based authentication key agreement protocol in iot-enabled cloud computing

TY Wu, L Wang, X Guo, YC Chen, SC Chu - Sustainability, 2022 - mdpi.com
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used
in people's daily lives. As the number of IoT devices increases, the amount of data to be …

ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things

N Li, M Ma, H Wang - Sensors, 2024 - mdpi.com
With the increasing demand for a digital world, the Industrial Internet of Things (IIoT) is
growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the …

3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things

S Cherbal - Wireless Personal Communications, 2024 - Springer
Abstract The Internet of Things (IoT) connect and link objects and people for creating,
processing and sharing countless information. The use of IoT is widely spread in important …

ECC-reliant secure authentication protocol for cloud server and smart devices in IoT

K Selvi, K Muthumanickam, P Vijayalakshmi… - The Journal of …, 2023 - Springer
Abstract The Internet of Things (IoT) designates a network that helps to relate a diversity of
heterogeneous devices, various technologies, and other items to the Internet for flexible …

A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier

KA Patel, S Shukla, SJ Patel - Concurrency and Computation …, 2024 - Wiley Online Library
Cloud computing is an emerging paradigm that enables on‐demand data storage without
considering the local infrastructure limitations of end‐users. The extensive growth in number …

Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing

S Radha, S Jeyalaksshmi - SN Computer Science, 2023 - Springer
Abstract Advanced technology of Cloud Computing (CC) is to provide the services without
straight executive of users and demand for resources. It is very scalable and vigorous as …

An ECC-based enhanced and secured authentication protocol for IoT and cloud server

B Chander, K Gopalakrishnan - International Journal of …, 2023 - inderscienceonline.com
Due to the tremendous development in various domains, both internet of things (IoTs) and
cloud-based computing are recognised as emerged technologies of the 20th century. IoT …

[PDF][PDF] A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments.

Z Dlimi, A Ezzati, S Ben Alla - Computer Systems Science & …, 2023 - cdn.techscience.cn
The growing advent of the Internet of Things (IoT) users is driving the adoption of cloud
computing technologies. The integration of IoT in the cloud enables storage and …

A Lightweight Certificateless Authentication and Key Agreement Protocol for Cloud Environments

J Niu, Y Wang, Z Ning, Y Wang… - … and Networks (ICCSN …, 2023 - ieeexplore.ieee.org
With the trend of multi-domain coexistence and multi-cloud convergence in cloud computing,
the security of massive device access is facing severe challenges. The essential security …