Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …

[Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server

N Khan, J Zhang, SU Jan - Security and Communication …, 2022 - Wiley Online Library
Everyone desires to avail online services provided by different service providers securely,
efficiently, and effectively. In this regard, security is still a significant concern for them …

An efficient authentication and key agreement scheme based on ECDH for wireless sensor network

MF Moghadam, M Nikooghadam, MAB Al Jabban… - IEEe …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor
nodes, different types of controls, and gateway nodes. these kinds of networks are used as …

A novel pairing-free lightweight authentication protocol for mobile cloud computing framework

A Irshad, SA Chaudhry, OA Alomari… - IEEE Systems …, 2020 - ieeexplore.ieee.org
The mobile cloud computing (MCC) refers to an infrastructure that integrates cloud
computing and mobile computing, and it has changed a great deal, the service provisioning …

A lightweight authentication and key exchange protocol with anonymity for IoT

D He, Y Cai, S Zhu, Z Zhao, S Chan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The number of IoT devices is growing rapidly, and the interaction between devices and
servers is also more frequent. However, IoT devices are often at the edge of the network …

A lightweight authentication protocol for IoT‐based cloud environment

S Zargar, A Shahidinejad… - International Journal of …, 2021 - Wiley Online Library
With the ever‐growing use of active internet devices, the Internet of Things (IoT) has
achieved vast popularity at present. Authentication technology is essential for the success of …

[HTML][HTML] A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment

A Peivandizadeh, H Y. Adarbah, B Molavi… - Future Internet, 2024 - mdpi.com
In today's advanced network and digital age, the Internet of Things network is experiencing a
significant growing trend and, due to its wide range of services and network coverage, has …

HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment

M Nikooghadam, HR Shahriari, ST Saeidi - Journal of Information Security …, 2023 - Elsevier
The ever-increasing internet usage has led to creation of Internet of Things. RFID is one of
the most common tracking tools for objects in Internet of Things, which has many different …

[PDF][PDF] A Secure and Efficient Information Authentication Scheme for E-Healthcare System.

N Khan, J Zhang, GA Mallah… - Computers, Materials & …, 2023 - researchgate.net
The mobile cellular network provides internet connectivity for heterogeneous Internet of
Things (IoT) devices. The cellular network consists of several towers installed at appropriate …

Security analysis of Nikooghadam et al.'s authentication protocol for cloud-IoT

M Azrour, J Mabrouki, Y Farhaoui… - Intelligent systems in big …, 2021 - Springer
The IoT has grown rapidly formerly it has changed our everyday practice. It has penetrated
all domains including agriculture, industry, environment, etc. Furthermore, IoT allows to …