REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things

M Tanveer, A Alkhayyat, N Kumar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the widespread utilization of Internet-enabled smart devices (SDs), the Industrial
Internet of Things (IIoT) has become prevalent in recent years. SDs exchange information …

SAKE*: A symmetric authenticated key exchange protocol with perfect forward secrecy for industrial Internet of Things

Q Fan, J Chen, M Shojafar, S Kumari… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Security in the Industrial Internet of Things (IIoT) is vital as there are some cases where IIoT
devices collect sensory information for crucial social production and life. Thus, designing …

SAPFS: An efficient symmetric-key authentication key agreement scheme with perfect forward secrecy for industrial Internet of Things

Y Zhang, D He, P Vijayakumar, M Luo… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
An edge-cloud Industrial Internet of Things (IIoT) can help meet the computing requirements
of industrial applications, particularly in time and latency-sensitive services. Ensuring the …

Faster authenticated key agreement with perfect forward secrecy for industrial internet-of-things

Z Yang, J He, Y Tian, J Zhou - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet
connectivity beyond traditional computing devices like computers and smartphones to the …

A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things

X Li, J Niu, MZA Bhuiyan, F Wu… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …

Building low-interactivity multifactor authenticated key exchange for industrial internet of things

Z Li, Z Yang, P Szalachowski… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) brings together computers, devices, advanced analytics,
and people in industries, such as transportation, oil plant, and power grid that leads to major …

Efficient batch authentication scheme based on edge computing in iiot

J Cui, F Wang, Q Zhang, C Gu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In the industrial Internet of Things (IIoT) environment (eg, a smart factory), smart devices with
limited computing power can bring large amounts of privacy-sensitive data into insecure …

Multi-factor based session secret key agreement for the Industrial Internet of Things

J Cui, F Cheng, H Zhong, Q Zhang, C Gu, L Liu - Ad Hoc Networks, 2023 - Elsevier
Abstract Industrial Internet of Things (IIoT) is the main field of application of the Internet of
Things (IoT). The high degree of autonomy and resource constraints of the IIoT network …

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem

M Shuai, L Xiong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a non-negligible subset of IoT, which focuses
on solving special requirements in industrial applications. In IIoT environments, remote …

[HTML][HTML] Sakap: Sgx-based authentication key agreement protocol in iot-enabled cloud computing

TY Wu, L Wang, X Guo, YC Chen, SC Chu - Sustainability, 2022 - mdpi.com
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used
in people's daily lives. As the number of IoT devices increases, the amount of data to be …