A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

User authentication schemes for wireless sensor networks: A review

S Kumari, MK Khan, M Atiquzzaman - Ad Hoc Networks, 2015 - Elsevier
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

Understanding node capture attacks in user authentication schemes for wireless sensor networks

C Wang, D Wang, Y Tu, G Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Despite decades of intensive research, it is still challenging to design a practical multi-factor
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

Q Jiang, J Ma, F Wei, Y Tian, J Shen, Y Yang - Journal of Network and …, 2016 - Elsevier
Recently, He et al. proposed an anonymous two-factor authentication scheme following the
concept of temporal-credential for wireless sensor networks (WSNs), which is claimed to be …

A two-factor security authentication scheme for wireless sensor networks in IoT environments

B Hu, W Tang, Q Xie - Neurocomputing, 2022 - Elsevier
As an important part of the Internet of Things, wireless sensor networks have been widely
used in all aspects of people's lives. Identity authentication in wireless sensor networks …

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring

R Ali, AK Pal, S Kumari, M Karuppiah… - Future Generation …, 2018 - Elsevier
Agriculture is the backbone of our economic system and plays an important role in the life of
an economy. It does not only provide raw material and food, but also provides large …

Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography

Y Choi, D Lee, J Kim, J Jung, J Nam, D Won - Sensors, 2014 - mdpi.com
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are
widely distributed to monitor various conditions, such as temperature, sound, speed and …

Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things

AD Dwivedi, R Singh, U Ghosh, RR Mukkamala… - Journal of Ambient …, 2022 - Springer
Nowadays, with the advancement of smart technologies, the Internet of Things (IoT)
emerged as a booming technology that can provide better quality and facilities for the …