Key agreement and authentication protocols in the Internet of Things: A survey

S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …

A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment

CM Chen, Z Li, S Kumari, G Srivastava… - Vehicular …, 2023 - Elsevier
In recent years, the Social Internet of Vehicles (SI o V) has been widely used in
transportation, dramatically enhancing people's lifestyles. SI o V can collect and process …

A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks

JY Lee, J Oh, Y Park - Electronics, 2023 - mdpi.com
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have
enabled medical professionals to identify patients' health information in real time to identify …

Edge–fog–cloud computing hierarchy for improving performance and security of NB-IoT-based health monitoring systems

YA Daraghmi, EY Daraghmi, R Daraghma, H Fouchal… - Sensors, 2022 - mdpi.com
This paper proposes a three-computing-layer architecture consisting of Edge, Fog, and
Cloud for remote health vital signs monitoring. The novelty of this architecture is in using the …

A PLS-HECC-based device authentication and key agreement scheme for smart home networks

J Pirayesh, A Giaretta, M Conti, P Keshavarzi - Computer Networks, 2022 - Elsevier
IoT devices permeate our society, collect personal data, and support critical infrastructures
such as the healthcare. Therefore, there is a critical need for authentication and …

Impact of technical indicators and leading indicators on stock trends on the internet of things

CM Chen, Y Gong, JMT Wu - Wireless Communications and …, 2022 - Wiley Online Library
The Internet of things (IoT) has had an enormous impact on the financial industry. With IoT,
people can obtain real‐time financial information; moreover, investment and financial …

Perception layer lightweight certificateless authentication scheme for IoT-based emergency logistics

J Yang, J Fan, X Zhu - IEEE Access, 2023 - ieeexplore.ieee.org
Emergency logistics is of great significance for supply security in emergencies. As a crucial
component of strategic material reserve and allocation, emergency logistics is characterized …

[PDF][PDF] AuthPFS: A method to verify perfect forward secrecy in authentication protocols

M Ge, S Kumari, CM Chen - J. Netw. Intell, 2022 - bit.kuas.edu.tw
Perfect forward secrecy (PFS) is a property of authentication protocols by which the
exposure of long-term key material that is used in the protocol to authenticate and negotiate …

PEASE: a PUF-based efficient authentication and session establishment protocol for machine-to-machine communication in industrial IoT

X Gong, T Feng, M Albettar - Electronics, 2022 - mdpi.com
Machine-to-machine (M2M) communication is one of the critical technologies of the
industrial Internet of Things (IoT), which consists of sensors, actuators at the edge, and …

Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review

NH Kamarudin, NHS Suhaimi, FA Nor Rashid… - Symmetry, 2024 - mdpi.com
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation
of robust security measures such as authentication has become paramount to safeguarding …