Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …

A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs

R Kumar, S Singh, PK Singh - Computers and Electrical Engineering, 2023 - Elsevier
In recent years, network-enabled physical devices have emerged as a solution to many
problems, such as those involved in transmitting data from the physical world …

Security and privacy analysis of Vinoth et al.'s authenticated key agreement scheme for industrial IoT

DZ Sun - Symmetry, 2021 - mdpi.com
Vinoth et al. proposed an authenticated key agreement scheme for industrial IoT (Internet of
Things) applications. Vinoth et al.'s scheme aimed to protect the remote sensing data of …

A quantitative study of authentic leadership, authentic followership, and organizational commitment, with tenure as moderator

D Sharma - 2022 - search.proquest.com
Literature has presented that authentic leadership was positively related to organizational
commitment. The first problem was validating this positive relationship in another setting …