A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

A systematic security assessment and review of internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

RAMP-IoD: A robust authenticated key management protocol for the Internet of Drones

M Tanveer, N Kumar, MM Hassan - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones
deployed for collecting sensitive data to be used in critical applications. The drones transmit …

Hybrid cryptographic approach to enhance the mode of key management system in cloud environment

S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …

REAP-IIoT: Resource-efficient authentication protocol for the industrial Internet of Things

M Tanveer, A Alkhayyat, N Kumar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the widespread utilization of Internet-enabled smart devices (SDs), the Industrial
Internet of Things (IIoT) has become prevalent in recent years. SDs exchange information …

Mfspv: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets

SA Alfadhli, S Lu, K Chen, M Sebai - IEEE Access, 2020 - ieeexplore.ieee.org
Vehicles authentication, the integrity of messages exchanged, and privacy-preserving are
essential features in vehicular ad hoc network (VANETs) security. Most of the previously …

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem

M Shuai, L **ong, C Wang, N Yu - Computer Communications, 2020 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a non-negligible subset of IoT, which focuses
on solving special requirements in industrial applications. In IIoT environments, remote …

LAKE-6SH: Lightweight user authenticated key exchange for 6LoWPAN-based smart homes

M Tanveer, G Abbas, ZH Abbas, M Bilal… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Ensuring security and privacy in the Internet of Things (IoT) while taking into account the
resource-constrained nature of IoT devices is challenging. In smart home (SH) IoT …

A lightweight secure user authentication and key agreement protocol for wireless sensor networks

J Mo, H Chen - Security and Communication Networks, 2019 - Wiley Online Library
Wireless sensor networks (WSNs) have great potential for numerous domains of application
because of their ability to sense and understand unattended environments. However, a …