Secure and lightweight user authentication scheme for cloud-assisted internet of things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …

Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …

[HTML][HTML] Maximizing energy efficiency in wireless sensor networks for data transmission: A Deep Learning-Based Grou** Model approach

I Surenther, KP Sridhar, MK Roberts - Alexandria Engineering Journal, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are widely studied for their data collection and
monitoring capabilities across diverse applications. However, the limited energy resources …

Designing secure PUF-based authentication protocols for constrained environments

SW Lee, M Safkhani, Q Le, OH Ahmed… - Scientific Reports, 2023 - nature.com
Abstract Physical Unclonable Functions (PUFs) are widely used in cryptographic
authentication and key-agreement protocols due to their unique physical properties. This …

Post-quantum secure authenticated key agreement protocol for wireless sensor networks

M Singh, D Mishra - Telecommunication Systems, 2023 - Springer
In today's digital world, our communication medium has become wireless. The addition of
many sensor devices in wireless connection forms a wireless sensor network (WSN). To …

SF‐LAP: Secure M2M Communication in IIoT with a Single‐Factor Lightweight Authentication Protocol

K Shahzad, M Alam, N Javaid, A Waheed… - Journal of …, 2022 - Wiley Online Library
Machine‐to‐machine communication allows smart devices like sensors, actuators, networks,
gateways, and other controllers to communicate with one another. The industrial Internet of …

A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN

S Rai, R Paul, S Banerjee, P Meher, G Sah - Journal of Grid Computing, 2024 - Springer
Abstract Wireless Medical Sensor Network (WMSN) is a kind of Ad-hoc Network that is used
in the health sector to continuously monitor patients' health conditions and provide instant …

Malicious replica quarantining protocol for Mobile Wireless Sensor Networks using replica detection and identification

EA Alrashed, MH Karaata, AA Hamdan - Internet of Things, 2024 - Elsevier
Since sensor networks are deployed in harsh and unattended environments, and the nodes
are not tamper-resistant, security is crucial for all the impending sensor network applications …

Evolutionary game and LGPSO for attack-defense confrontation analysis in WSN from macro perspective

N Liu, S Liu, WM Zheng - Expert Systems with Applications, 2025 - Elsevier
Wireless sensor network node security requires effective security mechanisms to protect the
security and reliability, so as to ensure that sensor nodes can operate normally and provide …

Practical and Secure Password Authentication and Key Agreement Scheme Based Dual-Server for IoT Devices in 5G Network

S Zhang, Y Liu, T Gao, Y **e… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
As the proliferation of 5th Generation Mobile Communication Technology (5G) accelerates
the adoption of Internet of Things (IoT) applications, building robust and secure …