Results 1 to 10 of about 2,279,222 (327)
A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes. [PDF]
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users.
Oh J, Yu S, Lee J, Son S, Kim M, Park Y.
europepmc +2 more sources
Provable Privacy Preserving Authentication Solution for Internet of Things Environment
The Internet of Things (IoT) has become an important technology which permits different devices and machines to interconnect with each other using heterogeneous networks. The integration of numerous techniques is expected to offer extraordinary growth in
Bander A. Alzahrani, Khalid Mahmood
doaj +1 more source
On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices.
Da-Zhi Sun, Yi-Na Gao, Yangguang Tian
doaj +1 more source
An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices
Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal that these protocols are either vulnerable to numerous attacks or computationally
Awaneesh Kumar Yadav +3 more
semanticscholar +1 more source
Continuous and low-cost broadcast authentication is a fundamental security service for distributed sensor networks. This paper presents a novel development of a continuous and low-overhead broadcast authentication protocol named enhanced Infinite timed ...
Khouloud Eledlebi +5 more
doaj +1 more source
Time‐assisted authentication protocol [PDF]
SummaryAuthentication is the first step toward establishing a service provider and customer association. In a mobile network environment, a lightweight and secure authentication protocol is one of the most significant factors to enhance the degree of service persistence.
Muhammad Bilal, Shin‐Gak Kang
openaire +2 more sources
Secure ECC-based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and can provide patients with a variety of remote healthcare services. In TMIS
Jongseok Ryu +6 more
semanticscholar +1 more source
The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment.
Khouloud Eledlebi +5 more
doaj +1 more source
While Vehicular Ad-hoc Networks (VANETs) can potentially improve driver safety and traffic mangement efficiency (e.g. through timely sharing of traffic status among vehicles), security and privacy are two ongoing issues that need to be addressed.
Chao Lin +4 more
semanticscholar +1 more source
A Novel Cross-Layer Authentication Protocol for the Internet of Things
An innovative cross-layer authentication protocol that integrates cryptography-based authentication and physical layer authentication (PLA) is proposed for massive cellular Internet of things (IoT) systems.
Yonggu Lee +3 more
doaj +1 more source

