A formally validated authentication algorithm for secure message forwarding in smart home networks
VO Nyangaresi - SN Computer Science, 2022 - Springer
The many devices connected in smart homes increase the attack surfaces from which
adversaries can invade the network. In addition, majority of these smart devices have …
adversaries can invade the network. In addition, majority of these smart devices have …
Lightweight key agreement and authentication protocol for smart homes
VO Nyangaresi - 2021 IEEE AFRICON, 2021 - ieeexplore.ieee.org
Sensitive and private information flows over smart home networks and it is therefore
paramount that proper authentication be accomplished among the communicating entities …
paramount that proper authentication be accomplished among the communicating entities …
[HTML][HTML] Energy efficient dynamic symmetric key based protocol for secure traffic exchanges in smart homes
Highly sensitive information about people's social life and daily activities flows in smart
home networks. As such, if attackers can manage to capture or even eavesdrop on this …
home networks. As such, if attackers can manage to capture or even eavesdrop on this …
Session-key establishment and authentication in a smart home network using public key cryptography
S Dey, A Hossain - IEEE Sensors Letters, 2019 - ieeexplore.ieee.org
The development of the applications of Internet of Things (IoT) technology continues to grow
steadily-one of the top applications being smart home environments. A smart home …
steadily-one of the top applications being smart home environments. A smart home …
Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
VO Nyangaresi - Journal of Systems Architecture, 2022 - Elsevier
The communication channel between the smart home devices and the remote users is
susceptible to numerous privacy and security compromise attacks. To address these issues …
susceptible to numerous privacy and security compromise attacks. To address these issues …
[HTML][HTML] ESCI-AKA: Enabling secure communication in an iot-enabled smart home environment using authenticated key agreement framework
H Alasmary, M Tanveer - Mathematics, 2023 - mdpi.com
Smart home environments are a vital component of the larger ecosystem within smart cities,
aiming to revolutionize residential living through the integration of Internet of Things (IoT) …
aiming to revolutionize residential living through the integration of Internet of Things (IoT) …
Key-free authentication protocol against subverted indoor smart devices for smart home
Z Huang, L Zhang, X Meng… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Smart homes are an increasingly common concept, particularly in technologically advanced
countries. In these settings, the smart devices [also commonly referred to as the Internet of …
countries. In these settings, the smart devices [also commonly referred to as the Internet of …
Lmas-shs: A lightweight mutual authentication scheme for smart home surveillance
The network-enabled smart objects are evolving everywhere in the modern era to solve
numerous problems like real-world data collection from the environment, communication …
numerous problems like real-world data collection from the environment, communication …
[HTML][HTML] Scalable, password-based and threshold authentication for smart homes
Smart homes are a special use-case of the IoT paradigm, which is becoming more and more
important in our lives. Although sensors, devices and applications make our daily lives …
important in our lives. Although sensors, devices and applications make our daily lives …
Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain
M Alshahrani, I Traore - Journal of information security and applications, 2019 - Elsevier
IoT platforms face huge challenge in deploying robust authentication mechanisms due to the
fact that edge devices and resource-constrained devices may not have enough compute …
fact that edge devices and resource-constrained devices may not have enough compute …