An Enhanced Secure Authentication Scheme for the Internet of Things

A Srivastava, LB Barik… - … on Sustainable Emerging …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) has led to the proliferation of interconnected devices, including
smart appliances and industrial sensors. Nevertheless, the rapid expansion of the IoT …

An overview of continuous device-to-device authentication techniques for the internet of things

A Badhib, A Cherif, S Alshehri - International Journal of Ad …, 2021 - inderscienceonline.com
Internet of things (IoT) has become an integral part of our daily life. However, this technology
exposes many security concerns. With the increasing focus on security and privacy, IoT …

Internet of things device authentication scheme using hardware serialization

A Hasan, KN Qureshi - 2018 International conference on …, 2018 - ieeexplore.ieee.org
Devices in the Internet of Things (IoT) are often placed ubiquitously so that they can sense,
process and communicate data in real time. IoT devices come in varying shapes and sizes …

Mechanism for Device Authentication and Session Key Generation in Industrial Internet of Things Networks

A Kumar, U Jain, M Hussain, MKI Rahmani… - IEEE …, 2024 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT), also known as Industry 4.0 is a major revolution in the
industry and it is designed for enhancement of productivity and reliability. Security is a prime …

An efficient device authentication protocol without certification authority for Internet of Things

S Jang, D Lim, J Kang, I Joe - Wireless Personal Communications, 2016 - Springer
Wireless network devices are used for the Internet of Things in a variety of applications, and
although the IoT has many benefits, there are some security issues in this area. Hacking …

Resource efficient authentication and session key establishment procedure for low-resource IoT devices

S Khan, AI Alzahrani, O Alfarraj, N Alalwan… - IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) can includes many resource-constrained devices, with most
usually needing to securely communicate with their network managers, which are more …

Mutual authentication and key agreement scheme between lightweight devices in internet of things

J Park, S Shin, N Kang - The Journal of Korean Institute of …, 2013 - koreascience.kr
IoT, which can be regarded as an enhanced version of M2M communication technology,
was proposed to realize intelligent thing to thing communications by utilizing Internet …

[PDF][PDF] Authentications for internet of things security: threats, challenges and studies

SY Moon, JH Park, JH Park - Journal of Internet Technology, 2018 - jit.ndhu.edu.tw
Abstract The Internet of Things (IoT) is attracting attention as the core technology with the
development of the wireless network and the universal use of portable terminals. IoT …

LAPE2D: Lightweight Authentication Protocol to Secure End and Edge Devices in Iot Framework

S Ramya, M Doraipndian, R Amirtharajan - Wireless Personal …, 2023 - Springer
Abstract The Internet of Things (IoT) is omnipresent in every industry and has extended its
footprint in various domains. This IoT device augmentation in today's smart world demands …

[PDF][PDF] Authentication Techniques in the Internet of Things Environment: A Survey.

S Hong - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
Abstract The Internet of Things (IoT) enables the offering of services specialized for each
client in real time by processing and analyzing the sensor information concerned after …