Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
A Methodical Analysis of Medical Internet of Things (MIoT) security and privacy in current and future trends
Healthcare system is rapidly transitioning from a traditional health-center and specialist-
focused model to a more scattered, patient-centric model. Medical Internet of Things (MIoT) …
focused model to a more scattered, patient-centric model. Medical Internet of Things (MIoT) …
Understanding node capture attacks in user authentication schemes for wireless sensor networks
Despite decades of intensive research, it is still challenging to design a practical multi-factor
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …
Anonymous authentication scheme for smart home environment with provable security
Smart home is an emerging paradigm of the Internet of Things (IoT), which facilitates an
individual to operate the smart home appliances remotely through the internet. Since the …
individual to operate the smart home appliances remotely through the internet. Since the …
Session Key Agreement Protocol for Secure D2D Communication
VO Nyangaresi, Z Mohammad - … Conference on Safety and Security with …, 2022 - Springer
Device to device (D2D) communication offers numerous benefits such as low latencies, high
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …
A secure and anonymous user authentication scheme for IoT-enabled smart home environments using PUF
With the continuous development of Internet of Things (IoT) technology, research on smart
home environments is being conducted by many researchers. In smart home environments …
home environments is being conducted by many researchers. In smart home environments …
Token-based lightweight authentication to secure IoT networks
The rapid growth of Internet of Things (IoT) technology offers huge opportunities and also
brings many new challenges related to the authentication in (IoT) devices. Using passwords …
brings many new challenges related to the authentication in (IoT) devices. Using passwords …
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things
To ensure secure access to the data held in internet of things, many lightweight
authentication schemes have been developed using approaches such as symmetric …
authentication schemes have been developed using approaches such as symmetric …