PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment
The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
are referred as drones. The on-going miniaturization of sensors, actuators, and processors …
LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …
Design of secure user authenticated key management protocol for generic IoT networks
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …
applications including smart home, smart city, smart grid, industrial Internet, connected …
Secure signature-based authenticated key establishment scheme for future IoT applications
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet.
These devices can be remotely accessed and controlled using existing network …
These devices can be remotely accessed and controlled using existing network …
BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment
The Internet of Medical Things (IoMT) is a kind of connected infrastructure of smart medical
devices along with software applications, health systems and services. These medical …
devices along with software applications, health systems and services. These medical …
Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …
having constraints of energy consumption, coverage, connectivity, and security. However …
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment
The concept of Internet of Things (IOT), which is already at our front doors, is that every
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …