Internet of things in industry: Research profiling, application, challenges and opportunities—a review

K Wójcicki, M Biegańska, B Paliwoda, J Górna - Energies, 2022 - mdpi.com
The fourth industrial revolution taking place in the industrial sector is related to the
increasing digitization and linkage of goods, products, value chains and business models …

A systematic security assessment and review of internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

M Tanveer, A Badshah, H Alasmary, SA Chaudhry - Internet of Things, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) revolutionizes industrial production using
smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit …

A secure three-factor authentication scheme for IoT environments

AHG Mirsaraei, A Barati, H Barati - Journal of Parallel and Distributed …, 2022 - Elsevier
Today, many users' extensive use of the Internet of Things (IoT) has made authentication an
inevitable issue in the IoT. The currently existing authentication methods are subjected to …

A three-factor-based authentication scheme of 5G wireless sensor networks for IoT system

SS Sahoo, S Mohanty, KS Sahoo… - IEEE internet of …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) is an expanding technology that facilitate physical devices to
interconnect each other over a public channel. Moreover, the security of the next-generation …

LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT

H Abdi Nasib Far, M Bayat, A Kumar Das, M Fotouhi… - Wireless …, 2021 - Springer
Nowadays, wireless sensor networks (WSNs) are essential for monitoring and data
collection in many industrial environments. Industrial environments are usually huge. The …

A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications

R Praveen, P Pabitha - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Abstract The Internet of Medical Things (IoMT) is a network of medical devices, hardware
infrastructure, and software that allows healthcare information technology to be …

AAKE-BIVT: Anonymous authenticated key exchange scheme for blockchain-enabled internet of vehicles in smart transportation

A Badshah, M Waqas, F Muhammad… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The next-generation Internet of vehicles (IoVs) seamlessly connects humans, vehicles,
roadside units (RSUs), and service platforms, to improve road safety, enhance transit …

Key agreement and authentication protocols in the Internet of Things: A survey

S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …