Authentication techniques for the internet of things: A survey
Internet of Things (IoT) consists of a large number of connected objects that are
communicating with each other. In order to support trusted communication between IoT …
communicating with each other. In order to support trusted communication between IoT …
Architectural design of token based authentication of MQTT protocol in constrained IoT device
A Bhawiyuga, M Data, A Warda - 2017 11th International …, 2017 - ieeexplore.ieee.org
An effective and secure authentication mechanism is one of the important part in
implementation of communication protocol in a Internet of Things (IoT) based system. As one …
implementation of communication protocol in a Internet of Things (IoT) based system. As one …
A lightweight authentication protocol for D2D-enabled IoT systems with privacy
CDM Pham, TK Dang - Pervasive and Mobile Computing, 2021 - Elsevier
Abstract The Internet of Things (IoT) has become a popular trend in the technology industry
with the huge benefits it brings by enabling heterogeneous interconnected devices and …
with the huge benefits it brings by enabling heterogeneous interconnected devices and …
[PDF][PDF] A new authentication scheme with elliptical curve cryptography for internet of things (IoT) environments
M Durairaj, K Muthuramalingam - Int. J. Eng. Technol, 2018 - researchgate.net
Abstract Internet of Things (IoT) consists of a large number of connected objects that are
communicating with each other. To support trusted communication between IoT objects, the …
communicating with each other. To support trusted communication between IoT objects, the …
Security aspects of digital twins in IoT platform
V Pavlov - 2022 - essay.utwente.nl
With the number of inter-connected devices, expected to be almost 30 billion by 2030, the
IoT technologies already became a part from everyday life, various areas like public health …
IoT technologies already became a part from everyday life, various areas like public health …
A Deep Learning Approach for ECG Authentication on Implantable Medical Devices
M Mahjeed, G Thamilarasu, N Johnson… - 2023 32nd …, 2023 - ieeexplore.ieee.org
The rise in smart healthcare systems have enhanced connectivity of implantable medical
devices (IMD). Healthcare providers are able to wirelessly control and monitor these devices …
devices (IMD). Healthcare providers are able to wirelessly control and monitor these devices …
Secure authentication scheme for internet of things in cloud
C Guntuku, SK Pasupuleti - 2018 3rd International Conference …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of all devices that can be accessed through the internet.
IoT devices can be remotely accessed and controlled using existing network infrastructure …
IoT devices can be remotely accessed and controlled using existing network infrastructure …
Mutual Authentication and Key Establishment Mechanism for Secure Data Sharing in M2M Environment
JO Park, S Kim - The Journal of the Institute of Internet …, 2015 - koreascience.kr
With rapid rise of virtualization technology from diverse types of cloud computing service,
security problems such as data safety and reliability are the issues at stake. Since damage …
security problems such as data safety and reliability are the issues at stake. Since damage …
[PDF][PDF] Reliable and Secure Traffic Exchange Approach for Internet of Things (IoT) Devices
Recently, Internet of Things (IoT) has become one of the most developing network
environments. Enhancement in electronic and microcontrollers has resulted into increasing …
environments. Enhancement in electronic and microcontrollers has resulted into increasing …
Survey on Various Security Issues Associated with Cloud Authentication Techniques
G Umamahesh, GVS Rajkumar - International Conference on Intelligent …, 2022 - Springer
The requirement for computing in the cloud has been steadily growing over the course of the
past few decades, which has led to an increase in the amount of attention that has been …
past few decades, which has led to an increase in the amount of attention that has been …