CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things

M Tanveer, A Badshah, H Alasmary, SA Chaudhry - Internet of Things, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) revolutionizes industrial production using
smart devices (SMDs) deployed in IIoT environments. These SMDs collect and transmit …

An enhanced multifactor authentication and key agreement protocol in industrial Internet of Things

Y Han, H Guo, J Liu, BB Ehui, Y Wu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is the application of the Internet of Things (IoT) in the
industrial field. IIoT allows users to remotely access industrial equipment and the data in it …

Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things

H Xu, C Hsu, L Harn, J Cui, Z Zhao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the increasing popularity and wide application of the Internet, the users (such as
managers and data consumers) in the Industrial Internet of Things (IIoT) can remotely …

RDAF-IIoT: Reliable device-access framework for the industrial Internet of Things

H Alasmary - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) has experienced significant growth and is now a fundamental
part of the next-generation Internet. Alongside improving daily life, IoT devices generate and …

Provably secure ECC-based anonymous authentication and key Agreement for IoT

S Hu, S Jiang, Q Miao, F Yang, W Zhou, P Duan - Applied Sciences, 2024 - mdpi.com
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting
user privacy have become increasingly challenging. End devices in the IoT are often …

A provably secure, privacy-preserving lightweight authentication scheme for peer-to-peer communication in healthcare systems based on internet of medical things

V Panchami, MM Mathews, S Justine - Computer Communications, 2023 - Elsevier
Abstract The Internet of Medical Things (IoMT) is a novel paradigm that plays a significant
role in healthcare applications. The Patient's healthcare information is gathered, and …

Provable secure anonymous device authentication protocol in iot environment

S Ren, Y Liu, B Yu, J Liu, D Li - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The inherent massive heterogeneous devices and open channels in the Internet of Things
(IoT) present significant challenges for identity authentication between devices and cloud …

SAKMS: A secure authentication and key management scheme for IETF 6TiSCH industrial wireless networks based on improved elliptic-curve cryptography

W Yang, C Hou, Y Wang, Z Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The Internet Engineering Task Force (IETF) developed a standard wireless communication
protocol stack called 6TiSCH to provide low-power and high-reliability communications in …

An auto-upgradable end-to-end pre-authenticated secure communication protocol for UAV-aided perception intelligent system

Z Zhang, Y Huang, W Huang, W Pan… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV)-enabled intelligent systems are emerging and empowering
real-time monitoring and modeling tasks. The security requirements in real-time UAV …

Physical Layer Authentication for Industrial Control Based on Convolutional Denoising Autoencoder

Y Chen, H He, S Liu, Y Zhang, Y Li… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Industrial control systems rely on wireless devices and sensors, necessitating critical
security. Physical layer authentication (PLA) is a promising mechanism for device …