Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

A comprehensive survey on certificate-less authentication schemes for vehicular ad hoc networks in intelligent transportation systems

SK Sripathi Venkata Naga, R Yesuraj, S Munuswamy… - Sensors, 2023 - mdpi.com
Data transmission in intelligent transportation systems is being challenged by a variety of
factors, such as open wireless communication channels, that pose problems related to …

A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography

D Sadhukhan, S Ray, GP Biswas, MK Khan… - The Journal of …, 2021 - Springer
Internet of things (IoT) has become a new era of communication technology for performing
information exchange. With the immense increment of usage of smart devices, IoT services …

LCDMA: Lightweight cross-domain mutual identity authentication scheme for Internet of Things

B Gong, G Zheng, M Waqas, S Tu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the widespread popularity of mobile terminals in the Internet of Things (IoT), the
demand for cross-domain access of mobile terminals between different regions has also …

Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …

A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud

AK Singh, A Nayyar, A Garg - Multimedia Tools and Applications, 2023 - Springer
With the increased number of smart devices in IoT and cloud, communication messages are
exchanged extensively throughout the network. This requires secure data transfer between …

The role of IoT in digital governance

A Khan, NZ Jhanjhi, M Humayun… - … Recent Technologies for …, 2020 - igi-global.com
The acronym IoT stands for internet of things. The IoT ecosystem can be envisioned as a set
of physical electronic devices embedded with intelligence, connected through a network …

Combination RSA with one time pad for enhanced scheme of two-factor authentication

Z Alamsyah, T Mantoro… - 2020 6th international …, 2020 - ieeexplore.ieee.org
RSA is a popular asymmetric key algorithm with two keys scheme, a public key for
encryption and private key for decryption. RSA has weaknesses in encryption and …

Wireless Networks: Active and Passive Attack Vulnerabilities and Privacy Challenges

IC Eian, KY Lim, MXL Yeap, HQ Yeo, Z Fatima - 2020 - preprints.org
In recent years, wireless networks have undoubtedly become a convenient way to connect
to the Internet and provide connection to everyone in any corner of the world. In fact, in this …

Honey-list based authentication protocol for industrial IoT swarms

MA El-Zawawy, P Kaliyar, M Conti, S Katsikas - Computer Communications, 2023 - Elsevier
Abstract Industrial Internet of Things (IIoT) systems are advanced IoT systems composed of
sensor devices supported with dynamic objects such as smart vehicles and drones. The …