Internet of things in industry: Research profiling, application, challenges and opportunities—a review
The fourth industrial revolution taking place in the industrial sector is related to the
increasing digitization and linkage of goods, products, value chains and business models …
increasing digitization and linkage of goods, products, value chains and business models …
A systematic security assessment and review of internet of things in the context of authentication
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things
Abstract The Industrial Internet of Things (IIoT) revolutionizes industrial production using
smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit …
smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit …
A secure three-factor authentication scheme for IoT environments
Today, many users' extensive use of the Internet of Things (IoT) has made authentication an
inevitable issue in the IoT. The currently existing authentication methods are subjected to …
inevitable issue in the IoT. The currently existing authentication methods are subjected to …
A three-factor-based authentication scheme of 5G wireless sensor networks for IoT system
Internet of Things (IoT) is an expanding technology that facilitate physical devices to
interconnect each other over a public channel. Moreover, the security of the next-generation …
interconnect each other over a public channel. Moreover, the security of the next-generation …
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT
Nowadays, wireless sensor networks (WSNs) are essential for monitoring and data
collection in many industrial environments. Industrial environments are usually huge. The …
collection in many industrial environments. Industrial environments are usually huge. The …
A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications
Abstract The Internet of Medical Things (IoMT) is a network of medical devices, hardware
infrastructure, and software that allows healthcare information technology to be …
infrastructure, and software that allows healthcare information technology to be …
AAKE-BIVT: Anonymous authenticated key exchange scheme for blockchain-enabled internet of vehicles in smart transportation
The next-generation Internet of vehicles (IoVs) seamlessly connects humans, vehicles,
roadside units (RSUs), and service platforms, to improve road safety, enhance transit …
roadside units (RSUs), and service platforms, to improve road safety, enhance transit …
Key agreement and authentication protocols in the Internet of Things: A survey
S Szymoniak, S Kesar - Applied Sciences, 2022 - mdpi.com
The rapid development of Internet of things (IoT) technology has made the IoT applicable in
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …
many areas of life and has contributed to the IoT's improvement. IoT devices are equipped …