A fast and scalable authentication scheme in IOT for smart living

J Li, J Jin, L Lyu, D Yuan, Y Yang, L Gao… - Future Generation …, 2021 - Elsevier
Numerous resource-limited smart objects (SOs) such as sensors and actuators have been
widely deployed in smart environments, opening new attack surfaces to intruders. The …

Toward secure and provable authentication for Internet of Things: Realizing industry 4.0

S Garg, K Kaur, G Kaddoum… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) has many applications, including Industry 4.0. There are a
number of challenges when deploying IoT devices in the Industry 4.0 setting, partly due to …

Fog computing security assessment for device authentication in the internet of things

S Al Harbi, T Halabi, M Bellaiche - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
The Fog is an emergent computing architecture that will support the mobility and geographic
distribution of Internet of Things (IoT) nodes and deliver context-aware applications with low …

Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model

S Amanlou, MK Hasan, KAA Bakar - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …

P-hip: A lightweight and privacy-aware host identity protocol for internet of things

M Hossain, R Hasan - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The host identity protocol (HIP) has emerged as the most suitable solution to uniquely
identify smart devices in the mobile and distributed Internet-of-Things (IoT) systems, such as …

Light-SAE: a lightweight authentication protocol for large-scale IoT environments made with constrained devices

P Rosa, A Souto, J Cecílio - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
Due to the increasing demand for Internet of Things (IoT) applications with sensitive data,
the use of encryption on constrained devices is crucial for protecting and ensuring privacy …

Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture

L Wang, H An, Z Chang - IEEE Access, 2020 - ieeexplore.ieee.org
The multi-level, heterogeneous and third-party attributes of fog computing (FC) have caused
great concern in the communication security of next-generation IoT systems. This paper …

[PDF][PDF] Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes.

MM Hossain, R Hasan - ICIOT, 2017 - researchgate.net
The Internet of Things (IoT) devices perform security-critical operations and deal with
sensitive information in the IoT-based systems. Therefore, the increased deployment of …

Privacy-preserving machine authenticated key agreement for internet of things

B Kapito, M Nyirenda, H Kim - International Journal of Computer …, 2021 - papers.ssrn.com
Internet of things (IoT) is the integration of computer-based systems and the physical world
in which things interact with each other. Due to heterogeneity and resource-constrained …

LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment

M Abdussami, R Amin, S Vollala - International Journal of Information …, 2022 - Springer
Due to the massive increase in the Internet of Things (IoT) devices in various applications
requiring an IoT–cloud environment, the network latency is high since all the IoT devices …