A systematic security assessment and review of internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …

Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap

M Wazid, AK Das, S Shetty, P Gope… - IEEE …, 2020 - ieeexplore.ieee.org
5G mobile communication systems promote the mobile network to not only interconnect
people, but also interconnect and control the machine and other devices. 5G-enabled …

Secure signature-based authenticated key establishment scheme for future IoT applications

S Challa, M Wazid, AK Das, N Kumar, AG Reddy… - Ieee …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet.
These devices can be remotely accessed and controlled using existing network …

Provably secure ECC-based device access control and key agreement protocol for IoT environment

AK Das, M Wazid, AR Yannam, JJPC Rodrigues… - IEEE …, 2019 - ieeexplore.ieee.org
For secure communication between any two neighboring sensing devices on the Internet of
Things (IoT) environment, it is essential to design a secure device access control and key …

Taxonomy and analysis of security protocols for Internet of Things

AK Das, S Zeadally, D He - Future Generation Computer Systems, 2018 - Elsevier
Abstract The Internet of Things (IoT) is a system of physical as well as virtual objects (each
with networking capabilities incorporated) that are interconnected to exchange and collect …

Authentication in cloud-driven IoT-based big data environment: Survey and outlook

M Wazid, AK Das, R Hussain, G Succi… - Journal of systems …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is composed of different networked objects (ie, smart
devices) which are interconnected to gather, process, refine, and exchange meaningful data …

Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system

J Srinivas, AK Das, M Wazid… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (eg,
vehicles) by a legitimate external party (user) is an important security service for big data …

Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication

A Diro, H Reda, N Chilamkurti, A Mahmood… - Ieee …, 2020 - ieeexplore.ieee.org
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a
significant challenge for securing IoT applications. This necessitates a robust and …

[HTML][HTML] A lightweight three factor authentication framework for IoT based critical applications

M Saqib, B Jasra, AH Moon - Journal of King Saud University-Computer …, 2022 - Elsevier
IoT is emerging as a massive web of heterogeneous networks estimated to interconnect
over 41 billion devices by 2025, generating around 79 zettabytes of data. The …

[HTML][HTML] EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element

C Patel, AK Bashir, AA AlZubi, R Jhaveri - Digital Communications and …, 2023 - Elsevier
Abstract Industrial IoT (IIoT) aims to enhance services provided by various industries, such
as manufacturing and product processing. IIoT suffers from various challenges, and security …