Internet of things security: challenges and key issues
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …
various objects and intelligent devices. The three important components of IoT are sensing …
[Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server
Everyone desires to avail online services provided by different service providers securely,
efficiently, and effectively. In this regard, security is still a significant concern for them …
efficiently, and effectively. In this regard, security is still a significant concern for them …
An efficient authentication and key agreement scheme based on ECDH for wireless sensor network
MF Moghadam, M Nikooghadam, MAB Al Jabban… - IEEe …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor
nodes, different types of controls, and gateway nodes. these kinds of networks are used as …
nodes, different types of controls, and gateway nodes. these kinds of networks are used as …
A novel pairing-free lightweight authentication protocol for mobile cloud computing framework
The mobile cloud computing (MCC) refers to an infrastructure that integrates cloud
computing and mobile computing, and it has changed a great deal, the service provisioning …
computing and mobile computing, and it has changed a great deal, the service provisioning …
A lightweight authentication and key exchange protocol with anonymity for IoT
The number of IoT devices is growing rapidly, and the interaction between devices and
servers is also more frequent. However, IoT devices are often at the edge of the network …
servers is also more frequent. However, IoT devices are often at the edge of the network …
A lightweight authentication protocol for IoT‐based cloud environment
S Zargar, A Shahidinejad… - International Journal of …, 2021 - Wiley Online Library
With the ever‐growing use of active internet devices, the Internet of Things (IoT) has
achieved vast popularity at present. Authentication technology is essential for the success of …
achieved vast popularity at present. Authentication technology is essential for the success of …
[HTML][HTML] A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
In today's advanced network and digital age, the Internet of Things network is experiencing a
significant growing trend and, due to its wide range of services and network coverage, has …
significant growing trend and, due to its wide range of services and network coverage, has …
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment
M Nikooghadam, HR Shahriari, ST Saeidi - Journal of Information Security …, 2023 - Elsevier
The ever-increasing internet usage has led to creation of Internet of Things. RFID is one of
the most common tracking tools for objects in Internet of Things, which has many different …
the most common tracking tools for objects in Internet of Things, which has many different …
[PDF][PDF] A Secure and Efficient Information Authentication Scheme for E-Healthcare System.
The mobile cellular network provides internet connectivity for heterogeneous Internet of
Things (IoT) devices. The cellular network consists of several towers installed at appropriate …
Things (IoT) devices. The cellular network consists of several towers installed at appropriate …
Security analysis of Nikooghadam et al.'s authentication protocol for cloud-IoT
The IoT has grown rapidly formerly it has changed our everyday practice. It has penetrated
all domains including agriculture, industry, environment, etc. Furthermore, IoT allows to …
all domains including agriculture, industry, environment, etc. Furthermore, IoT allows to …