[HTML][HTML] LDAKM-EIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment
In recent years, edge computing has emerged as a new concept in the computing paradigm
that empowers several future technologies, such as 5G, vehicle-to-vehicle communications …
that empowers several future technologies, such as 5G, vehicle-to-vehicle communications …
Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment
A Shahidinejad, M Ghobaei-Arani… - IEEE consumer …, 2021 - ieeexplore.ieee.org
Due to the ever-growing use of active Internet devices, the Internet has achieved good
popularity at present. The smart devices could connect to the Internet and communicate …
popularity at present. The smart devices could connect to the Internet and communicate …
Provably secure ECC-based device access control and key agreement protocol for IoT environment
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …
Things (IoT) environment, it is essential to design a secure device access control and key …
Review on security of internet of things authentication mechanism
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
[HTML][HTML] EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
Abstract Industrial IoT (IIoT) aims to enhance services provided by various industries, such
as manufacturing and product processing. IIoT suffers from various challenges, and security …
as manufacturing and product processing. IIoT suffers from various challenges, and security …
A secure low-cost edge device authentication scheme for the internet of things
Because of the enhanced capability of adversaries, edge devices of Internet of Things (IoT)
infrastructure are now increasingly vulnerable to counterfeiting and piracy. Ensuring the …
infrastructure are now increasingly vulnerable to counterfeiting and piracy. Ensuring the …
A decentralized scalable security framework for end‐to‐end authentication of future IoT communication
PSF Sheron, KP Sridhar, S Baskar… - Transactions on …, 2020 - Wiley Online Library
The development of Internet of Things (IoT) has granted multiple interoperable features for
user to digital things communication. The future communication technology and service …
user to digital things communication. The future communication technology and service …
A secure and reliable device access control scheme for IoT based sensor cloud systems
Among other security concerns, the reliable device to device direct communication is an
important research aspect in sensor cloud system application of Internet of things (IoT). The …
important research aspect in sensor cloud system application of Internet of things (IoT). The …
[HTML][HTML] Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have
gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with …
gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with …
A comprehensive study of security of internet-of-things
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …
transformative approach for providing numerous services. Compact smart devices constitute …