Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

User authentication schemes for wireless sensor networks: A review

S Kumari, MK Khan, M Atiquzzaman - Ad Hoc Networks, 2015 - Elsevier
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

MS Farash, M Turkanović, S Kumari, M Hölbl - Ad Hoc Networks, 2016 - Elsevier
The concept of Internet of Things (IOT), which is already at our front doors, is that every
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion

M Turkanović, B Brumen, M Hölbl - Ad Hoc Networks, 2014 - Elsevier
The idea of the Internet of Things (IOT) notion is that everything within the global network is
accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in …

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks

R Amin, GP Biswas - Ad Hoc Networks, 2016 - Elsevier
Wireless sensor networks can be deployed in any attended or unattended environments like
environmental monitoring, agriculture, military, health care etc., where the sensor nodes …

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

D He, N Kumar, J Chen, CC Lee, N Chilamkurti… - Multimedia …, 2015 - Springer
With the fast development of wireless communication technologies and semiconductor
technologies, the wireless sensor network (WSN) has been widely used in many …

A dynamic password-based user authentication scheme for hierarchical wireless sensor networks

AK Das, P Sharma, S Chatterjee, JK Sing - Journal of Network and …, 2012 - Elsevier
Most queries in wireless sensor network (WSN) applications are issued at the point of the
base station or gateway node of the network. However, for critical applications of WSNs …

Secure and efficient user authentication scheme for multi-gateway wireless sensor networks

J Srinivas, S Mukhopadhyay, D Mishra - Ad Hoc Networks, 2017 - Elsevier
Abstract By utilizing Internet of Things (IoT), the collected information from the sensor nodes
in wireless sensor networks (WSNs) could be provided to the users who are permitted to get …

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps

S Kumari, X Li, F Wu, AK Das, H Arshad… - Future Generation …, 2016 - Elsevier
Spread of wireless network technology has opened new doors to utilize sensor technology
in various areas via Wireless Sensor Networks (WSNs). Many authentication protocols for …

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks

AK Das - Peer-to-peer Networking and Applications, 2016 - Springer
User authentication is one of the most important security services required for the resource-
constrained wireless sensor networks (WSNs). In user authentication, for critical applications …