Key agreement and authentication protocols in the Internet of Things: A survey
S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …
A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment
In recent years, the Social Internet of Vehicles (SI o V) has been widely used in
transportation, dramatically enhancing people's lifestyles. SI o V can collect and process …
transportation, dramatically enhancing people's lifestyles. SI o V can collect and process …
A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks
JY Lee, J Oh, Y Park - Electronics, 2023 - mdpi.com
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have
enabled medical professionals to identify patients' health information in real time to identify …
enabled medical professionals to identify patients' health information in real time to identify …
Edge–fog–cloud computing hierarchy for improving performance and security of NB-IoT-based health monitoring systems
This paper proposes a three-computing-layer architecture consisting of Edge, Fog, and
Cloud for remote health vital signs monitoring. The novelty of this architecture is in using the …
Cloud for remote health vital signs monitoring. The novelty of this architecture is in using the …
A PLS-HECC-based device authentication and key agreement scheme for smart home networks
IoT devices permeate our society, collect personal data, and support critical infrastructures
such as the healthcare. Therefore, there is a critical need for authentication and …
such as the healthcare. Therefore, there is a critical need for authentication and …
Impact of technical indicators and leading indicators on stock trends on the internet of things
The Internet of things (IoT) has had an enormous impact on the financial industry. With IoT,
people can obtain real‐time financial information; moreover, investment and financial …
people can obtain real‐time financial information; moreover, investment and financial …
Perception layer lightweight certificateless authentication scheme for IoT-based emergency logistics
J Yang, J Fan, X Zhu - IEEE Access, 2023 - ieeexplore.ieee.org
Emergency logistics is of great significance for supply security in emergencies. As a crucial
component of strategic material reserve and allocation, emergency logistics is characterized …
component of strategic material reserve and allocation, emergency logistics is characterized …
[PDF][PDF] AuthPFS: A method to verify perfect forward secrecy in authentication protocols
Perfect forward secrecy (PFS) is a property of authentication protocols by which the
exposure of long-term key material that is used in the protocol to authenticate and negotiate …
exposure of long-term key material that is used in the protocol to authenticate and negotiate …
PEASE: a PUF-based efficient authentication and session establishment protocol for machine-to-machine communication in industrial IoT
X Gong, T Feng, M Albettar - Electronics, 2022 - mdpi.com
Machine-to-machine (M2M) communication is one of the critical technologies of the
industrial Internet of Things (IoT), which consists of sensors, actuators at the edge, and …
industrial Internet of Things (IoT), which consists of sensors, actuators at the edge, and …
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
NH Kamarudin, NHS Suhaimi, FA Nor Rashid… - Symmetry, 2024 - mdpi.com
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation
of robust security measures such as authentication has become paramount to safeguarding …
of robust security measures such as authentication has become paramount to safeguarding …