Toward secure and provable authentication for Internet of Things: Realizing industry 4.0

S Garg, K Kaur, G Kaddoum… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) has many applications, including Industry 4.0. There are a
number of challenges when deploying IoT devices in the Industry 4.0 setting, partly due to …

Enhanced authentication protocol for the Internet of Things environment

CM Chen, X Li, S Liu, ME Wu… - Security and …, 2022 - Wiley Online Library
The Internet of Things (IoT) is among the most promising technologies of the future, and its
development has garnered attention worldwide. However, the rise of the IoT has been …

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

A Kumar, R Saha, M Conti, G Kumar… - Journal of Network and …, 2022 - Elsevier
Abstract Internet of Thing (IoT) is one of the most influential technologies in the present time.
People, processes, and things are connected with the Internet through IoT. With the …

A secure authentication scheme for internet of things

KH Wang, CM Chen, W Fang, TY Wu - Pervasive and Mobile Computing, 2017 - Elsevier
Security is one of the major issues in Internet of Things (IoT) research. The rapid growth in
the number of IoT devices, the heterogeneity and complexity of these objects and their …

A multi‐attack resilient lightweight IoT authentication scheme

A Adeel, M Ali, AN Khan, T Khalid… - Transactions on …, 2022 - Wiley Online Library
Majority of the devices in the Internet of Things (IoT) are deployed in an environment that is
susceptible to cyber‐attacks. Due to the resource‐constraint nature of IoT, it is very hard to …

ECCbAP: A secure ECC-based authentication protocol for IoT edge devices

S Rostampour, M Safkhani, Y Bendavid… - Pervasive and Mobile …, 2020 - Elsevier
Despite continuous efforts, designing both a resource-efficient and secure authentication
protocol for Internet of Things (IoT) edge devices is still a great challenge for the industry. To …

Rotating behind security: A lightweight authentication protocol based on iot-enabled cloud computing environments

TY Wu, Q Meng, S Kumari, P Zhang - Sensors, 2022 - mdpi.com
With the rapid development of technology based on the Internet of Things (IoT), numerous
IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role …

Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment

A Shahidinejad, M Ghobaei-Arani… - IEEE consumer …, 2021 - ieeexplore.ieee.org
Due to the ever-growing use of active Internet devices, the Internet has achieved good
popularity at present. The smart devices could connect to the Internet and communicate …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …