A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey of Internet of Things (IoT) Authentication Schemes
2019
Sensors
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. ...
This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. ...
In [97] , the authors proposed a new model for authentication in VANETs based on group authentication. Vehicles are grouped and a session key is generated to be used for V2V communication. ...
doi:10.3390/s19051141
fatcat:sc6et2p5vneyvietpdr4gr4ena
Secure machine-type communications in LTE networks
2015
Wireless Communications and Mobile Computing
To address this problem, we propose an end-to-end security scheme for MTC based on the proxy-signature technique, called E 2 SEC. ...
MTC is standardized by the 3rd Generation Partnership Project (3GPP), which has been regarded as the promising solution facilitating machine-to-machine communications. ...
In this paper, we focus on building more secure machine-type communications in LTE networks by designing a unified end-to-end security scheme, called E 2 SEC. ...
doi:10.1002/wcm.2612
fatcat:jsp652qhangwxlowtud4lvruvq
Recent Security Trends in Internet of Things: a Comprehensive Survey
2021
IEEE Access
The end-devices can communicate to one or more gateways using ALOHA scheme through one-hop links. ...
Table 15 compares the IoT security schemes based on machine learning algorithms. ...
doi:10.1109/access.2021.3103725
fatcat:elfjfrhtnjfvhjp5jqtkj7r7gy
An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application
2013
International Journal of Distributed Sensor Networks
In this paper, we proposed cluster authentication scheme that mutually authenticates between vehicles by composing vehicle movement as cluster configuration architecture. ...
Thus, in near future, advanced wireless and mobile sensor network in M2M application will be major key factor of the future generation convergence network which is based on the state of the application ...
As scheme and protocol establishes authentication based on a trusted layer, it guarantees end-toend security. ...
doi:10.1155/2013/219396
fatcat:suboawrucne7xepwytrokihpxm
Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey
2021
Sensors
We classify IIoT technologies into the four-layer security architecture, examine the deployed countermeasure based on CIA+ security requirements, report the deficiencies of today's countermeasure, and ...
The studies gave a general overview of IIoT security threats or a detailed analysis that explicitly focuses on specific technologies. ...
Acknowledgments: This research was supported by the Malaysia Fundamental Research Grant Scheme-FRG0530-2020 and Universiti Malaysia Sabah Research Grant-SDK0165-2020. ...
doi:10.3390/s21196647
pmid:34640967
fatcat:ppydbddbjfgmrdix3diq2axizy
Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions
2020
Electronics
In addition, the emergence of software defined network (SDN) architecture for security in IoT is explained based on literature. ...
The reviewed literature is then compared based on various network security measures addressed by them. ...
A Dual Key-Based Activation Scheme for Secure LoRaWAN [60] Secure joining procedure for LoRa nodes. --Different keys are loaded to generate network and application session key. ...
doi:10.3390/electronics9081195
fatcat:ypnliknpobgwje3rilw7k5czqi
A Secure Model for Machine to Machine Device Domain Based Group in a Smart City Architecture
2019
International Journal of Intelligent Engineering and Systems
The distributed architecture of IoT aims at providing location awareness and low-latency interactions to Machine-to-Machine (M2M) applications. ...
authentication means, so that devices can benefit from high security functionalities without however having to execute computationally intensive operations with a low communication complexity. ...
The back-end On-the-Fly-Model-Checker (OFMC) and CL−based Attack Searcher (CL-AtSe) will be used to verify that the proposed scheme maintains its security objectives even under various attacks. ...
doi:10.22266/ijies2019.0228.16
fatcat:6jd4fxj6hfanlnzddhcu55lhti
ML-Based 5G Network Slicing Security: A Comprehensive Survey
2022
Future Internet
There has been a continuing advancement from 4G to 5G networks, with 5G mainly providing the three services of enhanced mobile broadband (eMBB), massive machine type communication (eMTC), and ultra-reliable ...
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband and communication services. ...
It also provides ultra-low-cost machine to machine (M2M) communication. URLLC stands for Ultra-Reliable Low Latency Communication. ...
doi:10.3390/fi14040116
fatcat:pe3niis5hfeohe62rj2gldh74q
Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
2019
Zenodo
Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. ...
In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. ...
In [12] , end to end architecture for mutual authentication based on Datagram Transport Layer Security (DTLS) was suggested. ...
doi:10.5281/zenodo.2576974
fatcat:22fvqtcfwrchhlmic7vrqrknz4
Analysis of Security methods in Internet of Things
2015
International Journal on Recent and Innovation Trends in Computing and Communication
In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated ...
Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. ...
The proposed architecture provides secure and authenticated communication in static machine-to-machine (M2M) networks and in small embedded systems by using Internet of Things (IOT) [1] . ...
doi:10.17762/ijritcc2321-8169.150446
fatcat:cx7woa2b7jhwjgl2gxofbv5j7i
PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications
2014
International Journal of Distributed Sensor Networks
The established authentication scheme PAuthKey is based on implicit certificates and it provides application level end-to-end security. ...
In order to maintain the trustworthy connectivity and the accessibility of distributed IoT, it is important to establish secure links for end-to-end communication with a strong pervasive authentication ...
Acknowledgments This work has been supported by Tekes under Massive Scale Machine-to-Machine Service (MAMMotH) project and Academy of Finland project SEMOHealth. ...
doi:10.1155/2014/357430
fatcat:aslpvd3i6nczvpgymk27v5hqg4
A New Scheme of Group-based AKA for Machine Type Communication over LTE Networks
2018
International Journal of Electrical and Computer Engineering (IJECE)
Machine Type Communication (MTC) is considered as one of the most important approaches to the future of mobile communication has attracted more and more attention. ...
Experimental results show that the proposed scheme can achieve robust security and avoid signaling overload on LTE networks. ...
wih New Scheme of Group-based AKA for Machine Type Communication over LTE …. ...
doi:10.11591/ijece.v8i2.pp1169-1181
fatcat:dq2nmhumvrhixketcztf7pyiha
Identifying and Isolating Zombie Attack in Cloud Computing
2020
Asian Journal of Research in Computer Science
In this paper, a technique based on strong authentication which, is able to detect malicious users from a network and isolates them from the cloud architecture is proposed. ...
With zombie attack, some malicious users may join the network which, in turn takes off the data of legitimate users and at the same time enable zombie nodes to communicate with a virtual machine on behalf ...
The previous mutual authentication such as plain password, and various existing schemes such as user authentication, time bound base scheme, mutual authentication scheme based on new ticket by using smart ...
doi:10.9734/ajrcos/2020/v6i230157
fatcat:a5woo7y7zjdwng22hiy73kcoee
Securing a Telecom Services Using Quantum Cryptographic Mechanisms
[chapter]
2012
Applied Cryptography and Network Security
Therefore, the services of security provides for the current network will not be sufficient for IN, the goal is more long. ...
the services that allow user groups to communicate by the public transmission and to change the equipment without unloading their intimacy and affluence of employment. ...
Therefore, the SIP authentication is applied only to the communications end-to-end or end-to-proxy; the authentication proxy-by-proxy would have to count on others mechanisms as IPsec or TLS. ...
doi:10.5772/33977
fatcat:skgwxpoyl5c63o334yyb7git7m
An IdM and Key-Based Authentication Method for Providing Single Sign-On in IoT
2015
2015 IEEE Global Communications Conference (GLOBECOM)
The proposal interact two key-based scheme, one for Internet and another for IoT to reach integration between both contexts. ...
Internet of Things (IoT) brings significant challenges to authentication schemes in a scenario with several appliances for a smart house that should be accessed by a technician for maintenance tasks, for ...
João Marynowski wishes to thanks the Coordination for the Improvement of Higher Level Personnel (CAPES) for the scholarship granting. ...
doi:10.1109/glocom.2015.7417597
fatcat:4gh37uplz5bz7dgzcij4l43wny
« Previous
Showing results 1 — 15 out of 27,488 results