4.6 Article

An Enhanced User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for IoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things

Muhammad Tanveer et al.

Summary: This article proposes a resource-efficient authentication protocol called REAP-IIoT for the Industrial Internet of Things (IIoT) environment, which utilizes lightweight cryptography (LWC) and hash function to address security and privacy concerns.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Multidisciplinary Sciences

SGXAP: SGX-Based Authentication Protocol in IoV-Enabled Fog Computing

Tsu-Yang Wu et al.

Summary: This paper presents a protocol design for authentication based on symmetric encryption algorithm and fog computing in the Internet of Vehicles. The proposed four-layer architecture reduces the computational burden of cloud servers. Intel software guard extensions are applied to enhance security and the protocol's security is proven through the Real-Or-Random model and informal analysis. Performance comparison with recent protocols shows better security and lower computational cost.

SYMMETRY-BASEL (2022)

Article Computer Science, Hardware & Architecture

CoMSeC plus plus : PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN

Priyanka Mall et al.

Summary: This paper explores a secure communication protocol for data collection in unattended environments using drone sensors, incorporating PUF technology to prevent leakage of private information, and informal analysis confirms the protocol's high-level security.

COMPUTER NETWORKS (2021)

Article Engineering, Electrical & Electronic

An Efficient and Provably Secure ECC-Based Conditional Privacy-Preserving Authentication for Vehicle-to-Vehicle Communication in VANETs

Ikram Ali et al.

Summary: In this paper, a certificateless short signature-based conditional privacy-preserving authentication (CLSS-CPPA) scheme for V2V communication is designed, improving performance in terms of computational and communication costs. The scheme is based on the elliptic curve cryptosystem (ECC) and does not use bilinear pairings or map-to-point hash functions, supporting batch signature verification for efficiency.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Hardware & Architecture

A secure blockchain-based group key agreement protocol for IoT

Chien-Ming Chen et al.

Summary: This paper proposes a blockchain-based authenticated group key agreement protocol for IoT, utilizing a device manager to connect IoT devices with blockchain networks. The protocol shows strong robustness against various attacks and reasonable time costs for operations in IoT environments.

JOURNAL OF SUPERCOMPUTING (2021)

Article Computer Science, Information Systems

A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things

Diksha Rangwani et al.

Summary: Wireless sensor networks play a key role in the Industrial Internet of Things, facilitating remote monitoring and analysis of data to ensure security and privacy protection. A robust provable-secure privacy-preserving three-factor authentication protocol is proposed to prevent security threats in the IIoT environment.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key

Anwar Ghani et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2019)

Article Computer Science, Theory & Methods

A robust and anonymous patient monitoring system using wireless medical sensor networks

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Secure multi-factor remote user authentication scheme for Internet of Things environments

Parwinder Kaur Dhillon et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Health Care Sciences & Services

A Mutual Authentication Framework for Wireless Medical Sensor Networks

Jangirala Srinivas et al.

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Computer Science, Hardware & Architecture

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

Fan Wu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

Ruhul Amin et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Theory & Methods

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps

Saru Kumari et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Hardware & Architecture

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

Qi Jiang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Telecommunications

A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks

Chin-Chen Chang et al.

WIRELESS PERSONAL COMMUNICATIONS (2016)

Article Computer Science, Hardware & Architecture

A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks

Kaiping Xue et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)