Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2024 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

A Methodical Analysis of Medical Internet of Things (MIoT) security and privacy in current and future trends

Y Perwej, N Akhtar, N Kulshrestha… - Journal of Emerging …, 2022 - hal.science
Healthcare system is rapidly transitioning from a traditional health-center and specialist-
focused model to a more scattered, patient-centric model. Medical Internet of Things (MIoT) …

Understanding node capture attacks in user authentication schemes for wireless sensor networks

C Wang, D Wang, Y Tu, G Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Despite decades of intensive research, it is still challenging to design a practical multi-factor
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …

Anonymous authentication scheme for smart home environment with provable security

M Shuai, N Yu, H Wang, L Xiong - Computers & Security, 2019 - Elsevier
Smart home is an emerging paradigm of the Internet of Things (IoT), which facilitates an
individual to operate the smart home appliances remotely through the internet. Since the …

Session Key Agreement Protocol for Secure D2D Communication

VO Nyangaresi, Z Mohammad - … Conference on Safety and Security with …, 2022 - Springer
Device to device (D2D) communication offers numerous benefits such as low latencies, high
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …

A secure and anonymous user authentication scheme for IoT-enabled smart home environments using PUF

Y Cho, J Oh, D Kwon, S Son, J Lee, Y Park - IEEE Access, 2022 - ieeexplore.ieee.org
With the continuous development of Internet of Things (IoT) technology, research on smart
home environments is being conducted by many researchers. In smart home environments …

Token-based lightweight authentication to secure IoT networks

M Dammak, ORM Boudia, MA Messous… - 2019 16th IEEE …, 2019 - ieeexplore.ieee.org
The rapid growth of Internet of Things (IoT) technology offers huge opportunities and also
brings many new challenges related to the authentication in (IoT) devices. Using passwords …

Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things

MA Al Sibahee, VO Nyangaresi, J Ma… - … Conference on Internet …, 2021 - Springer
To ensure secure access to the data held in internet of things, many lightweight
authentication schemes have been developed using approaches such as symmetric …