[HTML][HTML] EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element

C Patel, AK Bashir, AA AlZubi, R Jhaveri - Digital Communications and …, 2023 - Elsevier
Abstract Industrial IoT (IIoT) aims to enhance services provided by various industries, such
as manufacturing and product processing. IIoT suffers from various challenges, and security …

ECC based inter-device authentication and authorization scheme using MQTT for IoT networks

A Lohachab - Journal of Information Security and Applications, 2019 - Elsevier
Abstract Internet of Things (IoT) has emerged from the proliferation of smart and inter-
connected devices ranging from tiny sensors to complex Fog and Cloud nodes, various …

Provably secure ECC-based device access control and key agreement protocol for IoT environment

AK Das, M Wazid, AR Yannam, JJPC Rodrigues… - IEEE …, 2019 - ieeexplore.ieee.org
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …

[HTML][HTML] LDAKM-EIoT: Lightweight device authentication and key management mechanism for edge-based IoT deployment

M Wazid, AK Das, S Shetty, J JPC Rodrigues, Y Park - Sensors, 2019 - mdpi.com
In recent years, edge computing has emerged as a new concept in the computing paradigm
that empowers several future technologies, such as 5G, vehicle-to-vehicle communications …

RESEAP: An ECC-based authentication and key agreement scheme for IoT applications

M Safkhani, N Bagheri, S Kumari, H Tavakoli… - IEEE …, 2020 - ieeexplore.ieee.org
Although the Internet of Things (IoT) provides many benefits for our life but it also raises
many security threats. The main risk is the security of the transferred data comprising very …

ECCbAP: A secure ECC-based authentication protocol for IoT edge devices

S Rostampour, M Safkhani, Y Bendavid… - Pervasive and Mobile …, 2020 - Elsevier
Despite continuous efforts, designing both a resource-efficient and secure authentication
protocol for Internet of Things (IoT) edge devices is still a great challenge for the industry. To …

A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things

X Li, J Niu, MZA Bhuiyan, F Wu… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …

[HTML][HTML] Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for internet of things environment

U Ali, MYIB Idris, J Frnda, MNB Ayub, MA Khan… - Internet of Things, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a fast-growing technology that enable existing
systems to communicate with one another by using new devices such as sensors and other …

[HTML][HTML] A lightweight authentication and key agreement schemes for IoT environments

DH Lee, IY Lee - Sensors, 2020 - mdpi.com
In the Internet of Things (IoT) environment, more types of devices than ever before are
connected to the internet to provide IoT services. Smart devices are becoming more …

[HTML][HTML] An anonymous device to device authentication protocol using ECC and self certified public keys usable in Internet of Things based autonomous devices

BA Alzahrani, SA Chaudhry, A Barnawi, A Al-Barakati… - Electronics, 2020 - mdpi.com
Two party authentication schemes can be good candidates for deployment in Internet of
Things (IoT)-based systems, especially in systems involving fast moving vehicles. Internet of …