Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions

M Burhan, H Alam, A Arsalan, RA Rehman… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …

Bindaas: Blockchain-based deep-learning as-a-service in healthcare 4.0 applications

P Bhattacharya, S Tanwar, U Bodkhe… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Electronic Health Records (EHRs) allows patients to control, share, and manage their health
records among family members, friends, and healthcare service providers using an open …

Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is developing rapidly in such fields as smart grids and intelligent …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Design of secure user authenticated key management protocol for generic IoT networks

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

X Li, J Niu, S Kumari, F Wu, AK Sangaiah… - Journal of Network and …, 2018 - Elsevier
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …

Context-sensitive access in industrial internet of things (IIoT) healthcare applications

F Al-Turjman, S Alturjman - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Industrial Internet of Things (IIoTs) is the fast growing network of interconnected things that
collects and exchange data using embedded sensors planted everywhere. Several IIoT …

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication

K Mahmood, SA Chaudhry, H Naqvi, S Kumari… - Future Generation …, 2018 - Elsevier
An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of
electricity generation by providing the capability to monitor the consumption behavior of …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …