PUF-based authentication and key agreement protocols for IoT, WSNs, and smart grids: A comprehensive survey

P Mall, R Amin, AK Das, MT Leung… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Physically unclonable function (PUF) is a physical unit fabricated inside a sensor and
generally considered as an assurance anchor of resource inhibited device. Essentially, the …

A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care

M Masud, GS Gaba, S Alqahtani… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Due to the outbreak of COVID-19, the Internet of Medical Things (IoMT) has enabled the
doctors to remotely diagnose the patients, control the medical equipment, and monitor the …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Designing blockchain-based access control protocol in IoT-enabled smart-grid system

B Bera, S Saha, AK Das… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
We design a new blockchain-based access control protocol in IoT-enabled smart-grid
system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely …

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi… - Computer Networks, 2020 - Elsevier
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …

Secure signature-based authenticated key establishment scheme for future IoT applications

S Challa, M Wazid, AK Das, N Kumar, AG Reddy… - Ieee …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet.
These devices can be remotely accessed and controlled using existing network …

Design of secure user authenticated key management protocol for generic IoT networks

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …

Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment

B Bera, D Chattaraj, AK Das - Computer Communications, 2020 - Elsevier
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …

LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment

M Wazid, AK Das, V Bhat, AV Vasilakos - Journal of Network and Computer …, 2020 - Elsevier
Abstract Internet of Things (IoT) becomes a new era of the Internet, which consists of several
connected physical smart objects (ie, sensing devices) through the Internet. IoT has different …