On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices [PDF]
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices.
Da-Zhi Sun, Yi-Na Gao, Yangguang Tian
doaj +2 more sources
LPWAN Key Exchange: A Centralised Lightweight Approach [PDF]
The Internet of Things (IoT) is one of the fastest emerging technologies in the industry. It includes diverse applications with different requirements to provide services to users.
Gaurav Pathak +3 more
doaj +2 more sources
Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments [PDF]
The Internet of Things (IoT) environment is constantly evolving. Many IoT services have emerged, improving living conditions. Smart homes were among the first developments, and smart buildings, smart factories, and smart cities are attracting increasing ...
Dae-Hwi Lee, Im-Yeong Lee
doaj +2 more sources
Algorithms for Lightweight Key Exchange. [PDF]
Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile ...
Alvarez R +3 more
europepmc +5 more sources
New Cryptographic Primitive: Definition, Model and Construction of Ratched Key Exchange [PDF]
In the application of traditional cryptography,people always assume that the endpoints are secure and the adversary is on the communication channel.However,the prevalence of malware and system vulnerabilities makes endpoint compromise a se-rious and ...
FENG Deng-guo
doaj +1 more source
Efficiency Simultaneous key Exchange-Cryptography Extraction from Public key in Fog-Cloud Federation-Based Secure Offloading for Automatic Weather Stations Observing Systems [PDF]
Considering that in automatic weather station systems, raw data is collected by sensors by AWSs, and these sensors themselves cannot process raw data.
Yashar Salami +2 more
doaj +1 more source
Robust and Lightweight Remote User Authentication Mechanism for Next-Generation IoT-Based Smart Home
The IPv4 address architecture has been declared ended finally due to the fast growth of the Internet of Things (IoT). IPv6 is becoming a next-generation communication protocol and provides all the requirements that the industry needs.
Zeeshan Ashraf +5 more
doaj +1 more source
Implementation theoretical information protocol for public distribution cryptology keys [PDF]
This paper presents the design and implementation of a key distribution protocol over public channels. This protocol has its own source of randomness, based on data from civil air traffic.
Tatović Milomir +2 more
doaj +1 more source
Secure Vehicular Platoon Management against Sybil Attacks
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels.
Danial Ritzuan Junaidi +2 more
doaj +1 more source
Chaos theory and its extension into cryptography has generated significant applications in industrial mixing, pulse width modulation and in electric compaction.
Emmanuel Ahene +4 more
doaj +1 more source

