Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey
S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …
study various phenomena and to improve our lives. Hence, the sensors are used in …
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review
E Ebrahimpour, S Babaie - International Journal of Information Security, 2024 - Springer
Abstract Internet of Things (IoT) as an emerging technology is based on the idea that smart
things can connect to the Internet and exchange the collected data in a peer-to-peer …
things can connect to the Internet and exchange the collected data in a peer-to-peer …
PUFTAP-IoT: PUF-based three-factor authentication protocol in IoT environment focused on sensing devices
In IoT-based environments, smart services can be provided to users under various
environments, such as smart homes, smart factories, smart cities, smart transportation, and …
environments, such as smart homes, smart factories, smart cities, smart transportation, and …
A secure and efficient authentication and key agreement protocol in blockchain-enabled VANETs
J Shahparian, SH Erfani, A Zamanifar - Computers and Electrical …, 2025 - Elsevier
This paper proposes SEBAKA, a novel protocol for secure, scalable, and efficient blockchain-
based mutual authentication and key agreement (AKA) in Vehicular Ad-hoc Networks …
based mutual authentication and key agreement (AKA) in Vehicular Ad-hoc Networks …
Toward designing a lightweight RFID authentication protocol for constrained environments
Abstract In present times, Radio‐Frequency Identification (RFID) systems have seen a
significant rise in their usage. There has been an increasing interest in developing even …
significant rise in their usage. There has been an increasing interest in developing even …
Cryptanalysis of Authentication Protocol for Cloud Assisted IoT Environment
N Doshi, P Chaudhari - Procedia Computer Science, 2023 - Elsevier
In today's wireless based applications, sensors are playing the vital role due to its pluses like
low cost, low maintenance, hostile environment etc. On other end, cloud based technologies …
low cost, low maintenance, hostile environment etc. On other end, cloud based technologies …