A fast and scalable authentication scheme in IOT for smart living
Numerous resource-limited smart objects (SOs) such as sensors and actuators have been
widely deployed in smart environments, opening new attack surfaces to intruders. The …
widely deployed in smart environments, opening new attack surfaces to intruders. The …
Toward secure and provable authentication for Internet of Things: Realizing industry 4.0
The Internet of Things (IoT) has many applications, including Industry 4.0. There are a
number of challenges when deploying IoT devices in the Industry 4.0 setting, partly due to …
number of challenges when deploying IoT devices in the Industry 4.0 setting, partly due to …
Fog computing security assessment for device authentication in the internet of things
S Al Harbi, T Halabi, M Bellaiche - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
The Fog is an emergent computing architecture that will support the mobility and geographic
distribution of Internet of Things (IoT) nodes and deliver context-aware applications with low …
distribution of Internet of Things (IoT) nodes and deliver context-aware applications with low …
Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …
comprehensive services to users in different places. However, with the exponential growth of …
P-hip: A lightweight and privacy-aware host identity protocol for internet of things
The host identity protocol (HIP) has emerged as the most suitable solution to uniquely
identify smart devices in the mobile and distributed Internet-of-Things (IoT) systems, such as …
identify smart devices in the mobile and distributed Internet-of-Things (IoT) systems, such as …
Light-SAE: a lightweight authentication protocol for large-scale IoT environments made with constrained devices
Due to the increasing demand for Internet of Things (IoT) applications with sensitive data,
the use of encryption on constrained devices is crucial for protecting and ensuring privacy …
the use of encryption on constrained devices is crucial for protecting and ensuring privacy …
Security enhancement on a lightweight authentication scheme with anonymity fog computing architecture
L Wang, H An, Z Chang - IEEE Access, 2020 - ieeexplore.ieee.org
The multi-level, heterogeneous and third-party attributes of fog computing (FC) have caused
great concern in the communication security of next-generation IoT systems. This paper …
great concern in the communication security of next-generation IoT systems. This paper …
[PDF][PDF] Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes.
MM Hossain, R Hasan - ICIOT, 2017 - researchgate.net
The Internet of Things (IoT) devices perform security-critical operations and deal with
sensitive information in the IoT-based systems. Therefore, the increased deployment of …
sensitive information in the IoT-based systems. Therefore, the increased deployment of …
Privacy-preserving machine authenticated key agreement for internet of things
B Kapito, M Nyirenda, H Kim - International Journal of Computer …, 2021 - papers.ssrn.com
Internet of things (IoT) is the integration of computer-based systems and the physical world
in which things interact with each other. Due to heterogeneity and resource-constrained …
in which things interact with each other. Due to heterogeneity and resource-constrained …
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment
Due to the massive increase in the Internet of Things (IoT) devices in various applications
requiring an IoT–cloud environment, the network latency is high since all the IoT devices …
requiring an IoT–cloud environment, the network latency is high since all the IoT devices …