PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
A survey on IoT security: application areas, security threats, and solution architectures
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …
can be empowered to create, receive, and exchange data in a seamless manner. Various …
Anatomy of threats to the internet of things
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …
and control across heterogeneous network a reality, and has good prospects in industrial …
Securing electronics healthcare records in healthcare 4.0: A biometric-based approach
In recent years, there has been an exponential increase in the usage of Healthcare 4.0-
based diagnostics systems across the globe. In healthcare 4.0, the patient's records are …
based diagnostics systems across the globe. In healthcare 4.0, the patient's records are …
Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …
access in industrial wireless sensor networks (WSNs). However, more often than not, the …