Secure user authentication and key agreement scheme for IoT device access control based smart home communications
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Secure user authentication and key agreement scheme for IoT device access control based smart home communications
Authors
Keywords
-
Journal
WIRELESS NETWORKS
Volume -, Issue -, Pages -
Publisher
Springer Science and Business Media LLC
Online
2022-12-04
DOI
10.1007/s11276-022-03197-1
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- IoMT: A COVID-19 Healthcare System driven by Federated Learning and Blockchain
- (2022) O. Samuel et al. IEEE Journal of Biomedical and Health Informatics
- A lightweight machine learning-based authentication framework for smart IoT devices
- (2019) P. Punithavathi et al. INFORMATION SCIENCES
- IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT
- (2019) Hongyang Yan et al. Future Generation Computer Systems-The International Journal of eScience
- Reliable and secure data transfer in IoT networks
- (2019) Sarada Prasad Gochhayat et al. WIRELESS NETWORKS
- Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain
- (2019) Mohammed Alshahrani et al. Journal of Information Security and Applications
- Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography
- (2019) Khwaja Mansoor et al. SENSORS
- A Supervised Intrusion Detection System for Smart Home IoT Devices
- (2019) Eirini Anthi et al. IEEE Internet of Things Journal
- A security authorization scheme for smart home Internet of Things devices
- (2018) Bogdan-Cosmin Chifor et al. Future Generation Computer Systems-The International Journal of eScience
- Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
- (2018) Jangirala Srinivas et al. IEEE Transactions on Dependable and Secure Computing
- Secure data uploading scheme for a smart home system
- (2018) Jian Shen et al. INFORMATION SCIENCES
- A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
- (2018) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Secure Disintegration Protocol for Privacy Preserving Cloud Storage
- (2018) Bharat S. Rawal et al. WIRELESS PERSONAL COMMUNICATIONS
- A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication
- (2018) Peng Hao et al. IEEE Access
- Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications
- (2018) Norah Alassaf et al. MULTIMEDIA TOOLS AND APPLICATIONS
- An open source smart home management system based on IOT
- (2018) Kevin Naik et al. WIRELESS NETWORKS
- A Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things
- (2017) Xiong Li et al. IEEE Transactions on Industrial Informatics
- A review of smart home applications based on Internet of Things
- (2017) Mussab Alaa et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Fine-grained access control system based on fully outsourced attribute-based encryption
- (2017) Rui Zhang et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
- (2017) KSII Transactions on Internet and Information Systems
- Cyber Security Threats to IoT Applications and Service Domains
- (2017) Samuel Tweneboah-Koduah et al. WIRELESS PERSONAL COMMUNICATIONS
- Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
- (2017) Saurabh Singh et al. Journal of Ambient Intelligence and Humanized Computing
- Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
- (2016) Aakanksha Tewari et al. JOURNAL OF SUPERCOMPUTING
- Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
- (2015) Jung-Sik Cho et al. COMPUTERS & MATHEMATICS WITH APPLICATIONS
- A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
- (2015) Prosanta Gope et al. COMPUTERS & SECURITY
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- Analyzing well-known countermeasures against distributed denial of service attacks
- (2012) Hakem Beitollahi et al. COMPUTER COMMUNICATIONS
- Secure and Serverless RFID Authentication and Search Protocols
- (2008) Chiu Tan et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now