PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
generally considered as an assurance anchor of resource inhibited device. Essentially, the …
Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
Smart secure sensing for IoT-based agriculture: Blockchain perspective
Agriculture is a vital area for the sustenance of mankind engulfing manufacturing, security,
traceability, and sustainable resource management. With the resources receding …
traceability, and sustainable resource management. With the resources receding …
Understanding failures in security proofs of multi-factor authentication for mobile devices
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …
Design of secure user authenticated key management protocol for generic IoT networks
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …
applications including smart home, smart city, smart grid, industrial Internet, connected …
Smart contract-based blockchain-envisioned authentication scheme for smart farming
A blockchain-based smart farming technology provides the agricultural data to the farmers
and other users associated with smart farming on a single integrated platform. Moreover …
and other users associated with smart farming on a single integrated platform. Moreover …
Secure signature-based authenticated key establishment scheme for future IoT applications
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet.
These devices can be remotely accessed and controlled using existing network …
These devices can be remotely accessed and controlled using existing network …
Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …
limitations that need to be addressed in order for their deployment to be more widespread …
BAKMP-IoMT: Design of blockchain enabled authenticated key management protocol for internet of medical things deployment
The Internet of Medical Things (IoMT) is a kind of connected infrastructure of smart medical
devices along with software applications, health systems and services. These medical …
devices along with software applications, health systems and services. These medical …
Secure remote user authenticated key establishment protocol for smart home environment
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …
applications, such as smart living, smart health and smart transportation. Among all these …