A privacy-preserving code-based authentication protocol for Internet of Things

N Chikouche, PL Cayrel, EHM Mboup… - The Journal of …, 2019 - Springer
Abstract The Internet of Things (IoT) is an upcoming technology that permits to interconnect
different devices and machines using heterogeneous networks. One of the most critical …

A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future Directions

LC Thungon, N Ahmed, D De, MI Hussain - Wireless Personal …, 2024 - Springer
Provisioning security to the communications, data, and partaking things in resource-
constrained IoT is a huge challenge. Due to the scalability and interoperability among low …

Provable privacy preserving authentication solution for internet of things environment

BA Alzahrani, K Mahmood - IEEE Access, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has become an important technology which permits different
devices and machines to interconnect with each other using heterogeneous networks. The …

Secure authentication framework for IoT applications using a hash-based post-quantum signature scheme

P Tandel, J Nasriwala - Service Oriented Computing and Applications, 2024 - Springer
In today's era, numerous applications are evolving into smart applications by leveraging
technologies like the Internet of Things (IoT), Artificial Intelligence (AI), and Big Data. The …

An exploration to the quantum cryptography technology

H Jasoliya, K Shah - 2022 9th International Conference on …, 2022 - ieeexplore.ieee.org
The security of our data is the prime priority as it is said “Data is the new Oil”. Nowadays,
most of our communications are either recorded or forged. There are algorithms used under …

Hash-Based Signature for Flexibility Authentication of IoT Devices

HAN Songshen, XU Kaiyong… - … Journal of Natural …, 2022 - wujns.edpsciences.org
5G provides a unified authentication architecture and access management for IoT (Internet
of Things) devices. But existing authentication services cannot cover massive IoT devices …

[PDF][PDF] IoT security: authenticated lightweight key exchange (ALIKE)

L Ertaul, P Chudinov, B Morales - Proceedings of the …, 2019 - borg.csueastbay.edu
IoT security is becoming more and more important as the world relies on computer-based
devices. One of the most considerable challenges in today's world is having security and …

Secure Authentication Scheme based on Numerical Series Cryptography for Internet of Things

M AlaDin - 2022 - buescholar.bue.edu.eg
The rapid advancement of cellular networks and wireless networks has laid a solid basis for
the Internet of Things. IoT has evolved into a unique standard that allows diverse physical …

[PDF][PDF] Protecting IoT based transmitted data security using tokenized multiple layered encryption techniques

MF Ali, N Harum, NA Abu, MN Al-Mhiqani… - Int. J. Adv. Sci …, 2019 - researchgate.net
Now-a-days the development of Internet of Things (IoT) is increased rapidly in different
applications. The created IoT consists of several connected devices which are used to …

Evaluating post-quantum signatures for IoT devices

J Carneiro, LB Oliveira - Green, Pervasive, and Cloud Computing: 14th …, 2019 - Springer
With the advent of quantum computing, traditional digital signatures schemes such as RSA,
DSA, and ECDSA will become insecure thanks to Shor's algorithm which will break them in …