Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
User authentication schemes for wireless sensor networks: A review
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …
common to those which demand crucial security concerns. The deployment of WSNs in …
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
The concept of Internet of Things (IOT), which is already at our front doors, is that every
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
The idea of the Internet of Things (IOT) notion is that everything within the global network is
accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in …
accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in …
A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
Wireless sensor networks can be deployed in any attended or unattended environments like
environmental monitoring, agriculture, military, health care etc., where the sensor nodes …
environmental monitoring, agriculture, military, health care etc., where the sensor nodes …
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
With the fast development of wireless communication technologies and semiconductor
technologies, the wireless sensor network (WSN) has been widely used in many …
technologies, the wireless sensor network (WSN) has been widely used in many …
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Most queries in wireless sensor network (WSN) applications are issued at the point of the
base station or gateway node of the network. However, for critical applications of WSNs …
base station or gateway node of the network. However, for critical applications of WSNs …
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks
Abstract By utilizing Internet of Things (IoT), the collected information from the sensor nodes
in wireless sensor networks (WSNs) could be provided to the users who are permitted to get …
in wireless sensor networks (WSNs) could be provided to the users who are permitted to get …
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
Spread of wireless network technology has opened new doors to utilize sensor technology
in various areas via Wireless Sensor Networks (WSNs). Many authentication protocols for …
in various areas via Wireless Sensor Networks (WSNs). Many authentication protocols for …
A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
AK Das - Peer-to-peer Networking and Applications, 2016 - Springer
User authentication is one of the most important security services required for the resource-
constrained wireless sensor networks (WSNs). In user authentication, for critical applications …
constrained wireless sensor networks (WSNs). In user authentication, for critical applications …