A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions
PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …
User authentication schemes for wireless sensor networks: A review
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …
common to those which demand crucial security concerns. The deployment of WSNs in …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
Understanding node capture attacks in user authentication schemes for wireless sensor networks
Despite decades of intensive research, it is still challenging to design a practical multi-factor
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
Recently, He et al. proposed an anonymous two-factor authentication scheme following the
concept of temporal-credential for wireless sensor networks (WSNs), which is claimed to be …
concept of temporal-credential for wireless sensor networks (WSNs), which is claimed to be …
A two-factor security authentication scheme for wireless sensor networks in IoT environments
B Hu, W Tang, Q Xie - Neurocomputing, 2022 - Elsevier
As an important part of the Internet of Things, wireless sensor networks have been widely
used in all aspects of people's lives. Identity authentication in wireless sensor networks …
used in all aspects of people's lives. Identity authentication in wireless sensor networks …
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring
Agriculture is the backbone of our economic system and plays an important role in the life of
an economy. It does not only provide raw material and food, but also provides large …
an economy. It does not only provide raw material and food, but also provides large …
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are
widely distributed to monitor various conditions, such as temperature, sound, speed and …
widely distributed to monitor various conditions, such as temperature, sound, speed and …
Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things
Nowadays, with the advancement of smart technologies, the Internet of Things (IoT)
emerged as a booming technology that can provide better quality and facilities for the …
emerged as a booming technology that can provide better quality and facilities for the …