[HTML][HTML] LDAKM-EIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment

M Wazid, AK Das, S Shetty, J JPC Rodrigues, Y Park - Sensors, 2019 - mdpi.com
In recent years, edge computing has emerged as a new concept in the computing paradigm
that empowers several future technologies, such as 5G, vehicle-to-vehicle communications …

Light-edge: A lightweight authentication protocol for IoT devices in an edge-cloud environment

A Shahidinejad, M Ghobaei-Arani… - IEEE consumer …, 2021 - ieeexplore.ieee.org
Due to the ever-growing use of active Internet devices, the Internet has achieved good
popularity at present. The smart devices could connect to the Internet and communicate …

Provably secure ECC-based device access control and key agreement protocol for IoT environment

AK Das, M Wazid, AR Yannam, JJPC Rodrigues… - IEEE …, 2019 - ieeexplore.ieee.org
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

[HTML][HTML] EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element

C Patel, AK Bashir, AA AlZubi, R Jhaveri - Digital Communications and …, 2023 - Elsevier
Abstract Industrial IoT (IIoT) aims to enhance services provided by various industries, such
as manufacturing and product processing. IIoT suffers from various challenges, and security …

A secure low-cost edge device authentication scheme for the internet of things

U Guin, A Singh, M Alam, J Canedo… - 2018 31st International …, 2018 - ieeexplore.ieee.org
Because of the enhanced capability of adversaries, edge devices of Internet of Things (IoT)
infrastructure are now increasingly vulnerable to counterfeiting and piracy. Ensuring the …

A decentralized scalable security framework for end‐to‐end authentication of future IoT communication

PSF Sheron, KP Sridhar, S Baskar… - Transactions on …, 2020 - Wiley Online Library
The development of Internet of Things (IoT) has granted multiple interoperable features for
user to digital things communication. The future communication technology and service …

A secure and reliable device access control scheme for IoT based sensor cloud systems

SA Chaudhry, K Yahya, F Al-Turjman, MH Yang - Ieee Access, 2020 - ieeexplore.ieee.org
Among other security concerns, the reliable device to device direct communication is an
important research aspect in sensor cloud system application of Internet of things (IoT). The …

[HTML][HTML] Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

TY Wu, F Kong, Q Meng, S Kumari… - EURASIP Journal on …, 2023 - Springer
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have
gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …