Key agreement and authentication protocols in the Internet of Things: A survey

S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …

Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …

Harnessing federated generative learning for green and sustainable Internet of Things

Y Qi, MS Hossain - Journal of Network and Computer Applications, 2024 - Elsevier
The rapid proliferation of devices in the Internet of Things (IoT) has ushered in a
transformative era of data-driven connectivity across various domains. However, this …

An anonymous authentication and key update mechanism for IoT devices based on EnOcean protocol

Y Wu, T Feng - Sensors, 2022 - mdpi.com
EnOcean, a commonly used control protocol in smart lighting systems, provides
authentication, as well as message integrity verification services, and can resist replay attack …

An authenticated group shared key mechanism based on a combiner for hash functions over the industrial internet of things

W Ali, AA Ahmed - Processes, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) provides internet connectivity for instruments, digital
machines, and any other manufactured object to enable intelligent industrial operations to …

Crystals kyber cryptographic algorithm for efficient IoT D2d communication

S Selvakumar, A Ahilan, B Ben Sujitha… - Wireless …, 2024 - Springer
Abstract Device-to-Device (D2D) communication stands as a pivotal technology
revolutionizing conventional base station-to-device (B2D) communication paradigms. It …

[PDF][PDF] Internet of Things Authentication Protocols: Comparative Study.

S Dargaoui, M Azrour, A El Allaoui… - … Materials & Continua, 2024 - cdn.techscience.cn
Nowadays, devices are connected across all areas, from intelligent buildings and smart
cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things …

Lightweight anonymous authentication and key agreement protocol based on coap of internet of things

X Gong, T Feng - Sensors, 2022 - mdpi.com
To solve the problem regarding the lack of a lightweight and secure authentication and key
agreement protocol in the Constrained Application Protocol of the Internet of Things …

An exhaustive survey on authentication classes in the IoT environments

S Dargaoui, M Azrour, A El Allaoui… - … Journal of Electrical …, 2024 - section.iaesonline.com
In today's world, devices are interconnected across various fields, ranging from intelligent
buildings and smart cities to Industry 4.0 and smart healthcare. IoT security is still the biggest …

DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation

M Abdussami, SK Dwivedi, T Al-Shehari… - Computers and …, 2024 - Elsevier
The growing reliance on wireless communication in Internet-of-Things (IoT) devices
highlights the critical need for secure and efficient communication protocols, especially in …