An Exhaustive Survey on Authentication Classes in the IoT Environments

Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, Azidine Guezzaz, Abdulatif Alabdulatif, Abdullah Alnajim

Keywords


Internet of Things; Attacks; Security; Cryptography; Authentication

References


M. U. Farooq, M. Waseem, S. Mazhar, A. Khairi, and T. Kamal, “A review on internet of things (IoT),” International journal of computer applications, vol. 113, no. 1, pp. 1–7, 2015.

P. Suresh, J. V. Daniel, V. Parthasarathy, and R. H. Aswathy, “A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment,” in 2014 International conference on science engineering and management research (ICSEMR), IEEE, 2014, pp. 1–8.

“Présentation générale de l’Internet des objets, secteur de la normalisation des télécommunications de l’UIT, 06-2012.

“Architecting a connected future,” ISO. Accessed: Feb. 03, 2023. [Online]. Available: https://www.iso.org/cms/render/live/en/sites/isoorg/contents/news/2019/01/Ref2361.html

N. Islam, M. M. Rashid, F. Pasandideh, B. Ray, S. Moore, and R. Kadel, “A review of applications and communication technologies for internet of things (Iot) and unmanned aerial vehicle (uav) based sustainable smart farming,” Sustainability, vol. 13, no. 4, p. 1821, 2021.

H. Landaluce, L. Arjona, A. Perallos, F. Falcone, I. Angulo, and F. Muralter, “A review of IoT sensing applications and challenges using RFID and wireless sensor networks,” Sensors, vol. 20, no. 9, p. 2495, 2020.

S. Dargaoui, M. Azrour, A. El Allaoui, A. Guezzaz, and S. Benkirane, “Authentication in Internet of Things: State of Art,” in Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security, 2023, pp. 1–6.

S. Dargaoui et al., “Security Issues in Internet of Medical Things,” 2023, pp. 77–91. doi: 10.1201/9781003438779-5.

S. Dargaoui et al., “Applications of Blockchain in Healthcare:,” 2023, pp. 1–12. doi: 10.1201/9781003430735-1.

J. Mabrouki et al., “Smart system for monitoring and controlling of agricultural production by the IoT,” in IoT and Smart Devices for Sustainable Environment, Springer, 2022, pp. 103–115.

J. Mabrouki, M. Azrour, and S. E. Hajjaji, “Use of internet of things for monitoring and evaluating water’s quality: a comparative study,” International Journal of Cloud Computing, vol. 10, no. 5–6, pp. 633–644, 2021.

G. Fattah, J. Mabrouki, F. Ghrissi, M. Azrour, and Y. Abrouki, “Multi-Sensor System and Internet of Things (IoT) Technologies for Air Pollution Monitoring,” in Futuristic Research Trends and Applications of Internet of Things, CRC Press, 2022, pp. 101–116.

S. Dargaoui et al., “An Overview of the Security Challenges in IoT Environment,” in Advanced Technology for Smart Environment and Energy, J. Mabrouki, A. Mourade, A. Irshad, and S. A. Chaudhry, Eds., in Environmental Science and Engineering. , Cham: Springer International Publishing, 2023, pp. 151–160. doi: 10.1007/978-3-031-25662-2_13.

F. Righetti, C. Vallati, and G. Anastasi, “IoT applications in smart cities: A perspective into social and ethical issues,” in 2018 IEEE International Conference on Smart Computing (SMARTCOMP), IEEE, 2018, pp. 387–392.

W. A. Jabbar et al., “Design and fabrication of smart home with internet of things enabled automation system,” IEEE access, vol. 7, pp. 144059–144074, 2019.

V. K. Quy, N. V. Hau, D. V. Anh, and L. A. Ngoc, “Smart healthcare IoT applications based on fog computing: architecture, applications and challenges,” Complex & Intelligent Systems, vol. 8, no. 5, pp. 3805–3815, 2022.

M. Azrour, J. Mabrouki, A. Guezzaz, and A. Kanwal, “Internet of things security: challenges and key issues,” Security and Communication Networks, vol. 2021, pp. 1–11, 2021.

M. Mohy-eddine, A. Guezzaz, S. Benkirane, and M. Azrour, “An effective intrusion detection approach based on ensemble learning for IIoT edge computing,” Journal of Computer Virology and Hacking Techniques, pp. 1–13, 2022.

M. Douiba, S. Benkirane, A. Guezzaz, and M. Azrour, “An improved anomaly detection model for IoT security using decision tree and gradient boosting,” The Journal of Supercomputing, pp. 1–20, 2022.

C. Hazman, A. Guezzaz, S. Benkirane, and M. Azrour, “lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning,” Cluster Computing, pp. 1–15, 2022.

W. H. Hassan, “Current research on Internet of Things (IoT) security: A survey,” Computer networks, vol. 148, pp. 283–294, 2019.

H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the internet of things: a review,” in 2012 international conference on computer science and electronics engineering, IEEE, 2012, pp. 648–651.

A. Kumar, R. Saha, M. Conti, G. Kumar, W. J. Buchanan, and T. H. Kim, “A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions,” Journal of Network and Computer Applications, p. 103414, 2022.

M. Trnka, A. S. Abdelfattah, A. Shrestha, M. Coffey, and T. Cerny, “Systematic review of authentication and authorization advancements for the Internet of Things,” Sensors, vol. 22, no. 4, p. 1361, 2022.

M. Saqib and A. H. Moon, “A Systematic Security Assessment and Review of Internet of Things in the context of Authentication,” Computers & Security, p. 103053, 2022.

A. N. Bahache, N. Chikouche, and F. Mezrag, “Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey,” SN Computer Science, vol. 3, no. 5, p. 382, 2022.

W. K. Ahmed and R. S. Mohammed, “Lightweight Authentication Methods in IoT: Survey,” in 2022 International Conference on Computer Science and Software Engineering (CSASE), IEEE, 2022, pp. 241–246.

I. Singh and B. Singh, “Access management of IoT devices using access control mechanism and decentralized authentication: A review,” Measurement: Sensors, p. 100591, 2022.

A. H. Mohsin et al., “Blockchain authentication of network applications: Taxonomy, classification, capabilities, open challenges, motivations, recommendations and future directions,” Computer Standards & Interfaces, vol. 64, pp. 41–60, 2019.

A. H. Sodhro, A. I. Awad, J. van de Beek, and G. Nikolakopoulos, “Intelligent authentication of 5G healthcare devices: A survey,” Internet of Things, p. 100610, 2022.

J.-R. Jiang, “Short survey on physical layer authentication by machine-learning for 5G-based Internet of Things,” in 2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII), IEEE, 2020, pp. 41–44.

M. Wazid, A. K. Das, S. Shetty, P. Gope, and J. J. Rodrigues, “Security in 5G-enabled internet of things communication: issues, challenges, and future research roadmap,” IEEE Access, vol. 9, pp. 4466–4489, 2020.

M. A. Ferrag, L. Maglaras, and A. Derhab, “Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends,” Security and Communication Networks, vol. 2019, 2019.

W. Yang, S. Wang, N. M. Sahri, N. M. Karie, M. Ahmed, and C. Valli, “Biometrics for internet-of-things security: A review,” Sensors, vol. 21, no. 18, p. 6163, 2021.

M. El-Hajj, A. Fadlallah, M. Chamoun, and A. Serhrouchni, “A survey of internet of things (IoT) authentication schemes,” Sensors, vol. 19, no. 5, p. 1141, 2019.

W. Akram, K. Mahmood, X. Li, M. Sadiq, Z. Lv, and S. A. Chaudhry, “An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing,” Computer Networks, vol. 217, p. 109335, 2022.

O. Salman, S. Abdallah, I. H. Elhajj, A. Chehab, and A. Kayssi, “Identity-based authentication scheme for the Internet of Things,” in 2016 IEEE Symposium on Computers and Communication (ISCC), IEEE, 2016, pp. 1109–1111.

B. B. Gupta, A. Gaurav, K. T. Chui, and C.-H. Hsu, “Identity-based authentication technique for iot devices,” in 2022 IEEE International Conference on Consumer Electronics (ICCE), IEEE, 2022, pp. 1–4.

X. Jia et al., “IRBA: an identity-based cross-domain authentication scheme for the internet of things,” Electronics, vol. 9, no. 4, p. 634, 2020.

A. G. Reddy, D. Suresh, K. Phaneendra, J. S. Shin, and V. Odelu, “Provably secure pseudo-identity based device authentication for smart cities environment,” Sustainable cities and society, vol. 41, pp. 878–885, 2018.

Y. Ashibani and Q. H. Mahmoud, “A behavior profiling model for user authentication in IoT networks based on app usage patterns,” in IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, IEEE, 2018, pp. 2841–2846.

Z. Zhang, H. Ning, F. Farha, J. Ding, and K.-K. R. Choo, “Artificial intelligence in physiological characteristics recognition for internet of things authentication,” Digital Communications and Networks, 2022.

M. A. Ferrag, L. Maglaras, and A. Derhab, “Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends,” Security and Communication Networks, vol. 2019, 2019.

Y. Liang, S. Samtani, B. Guo, and Z. Yu, “Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective,” IEEE Internet of Things Journal, vol. 7, no. 9, pp. 9128–9143, 2020.

V. Kumar and S. Ray, “Continuous Behavioral Authentication System for IoT Enabled Applications,” in International Conference on Network Security and Blockchain Technology, Springer, 2022, pp. 51–63.

W. Li, W. Meng, and S. Furnell, “Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities,” Pattern Recognition Letters, vol. 144, pp. 35–41, 2021.

S. Duraibi, “Voice biometric identity authentication model for IoT devices,” International Journal of Security, Privacy and Trust Management (IJSPTM) Vol, vol. 9, 2020.

N. Ghosh, S. Chandra, V. Sachidananda, and Y. Elovici, “SoftAuthZ: a context-aware, behavior-based authorization framework for home IoT,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10773–10785, 2019.

D. Li, W. Peng, W. Deng, and F. Gai, “A blockchain-based authentication and security mechanism for IoT,” in 2018 27th International Conference on Computer Communication and Networks (ICCCN), IEEE, 2018, pp. 1–6.

U. Khalid, M. Asim, T. Baker, P. C. Hung, M. A. Tariq, and L. Rafferty, “A decentralized lightweight blockchain-based authentication mechanism for IoT systems,” Cluster Computing, vol. 23, no. 3, pp. 2067–2087, 2020.

S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain meets edge computing: A distributed and trusted authentication system,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1972–1983, 2019.

S. Kakei, Y. Shiraishi, M. Mohri, T. Nakamura, M. Hashimoto, and S. Saito, “Cross-certification towards distributed authentication infrastructure: A case of hyperledger fabric,” IEEE Access, vol. 8, pp. 135742–135757, 2020.

B. K. Mohanta, A. Sahoo, S. Patel, S. S. Panda, D. Jena, and D. Gountia, “Decauth: Decentralized authentication scheme for iot device using ethereum blockchain,” in TENCON 2019-2019 IEEE Region 10 Conference (TENCON), IEEE, 2019, pp. 558–563.

A. Yazdinejad, G. Srivastava, R. M. Parizi, A. Dehghantanha, K.-K. R. Choo, and M. Aledhari, “Decentralized authentication of distributed patients in hospital networks using blockchain,” IEEE journal of biomedical and health informatics, vol. 24, no. 8, pp. 2146–2156, 2020.

D. Díaz-Sánchez, A. Marín-Lopez, F. Almenárez Mendoza, and P. Arias Cabarcos, “DNS/DANE collision-based distributed and dynamic authentication for microservices in IoT,” Sensors, vol. 19, no. 15, p. 3292, 2019.

P. Sudhakaran, “Energy efficient distributed lightweight authentication and encryption technique for IoT security,” International Journal of Communication Systems, vol. 35, no. 2, p. e4198, 2022.

G. Pathak, J. Gutierrez, A. Ghobakhlou, and S. U. Rehman, “LPWAN Key Exchange: A Centralised Lightweight Approach,” Sensors, vol. 22, no. 13, p. 5065, 2022.

U. Verma and D. Bhardwaj, “CMAKM-FIoT: centralised mutual authentication and key management scheme for fog computing-enabled IoT network,” International Journal of Electronic Business, vol. 17, no. 4, pp. 407–427, 2022.

Z. Li, Q. Miao, S. A. Chaudhry, and C.-M. Chen, “A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles,” International Journal of Distributed Sensor Networks, vol. 18, no. 6, p. 15501329221104332, 2022.

S. Farooq and P. Chawla, “A Novel Approach of Mutual Authentication in Fog Computing,” in Proceedings of First International Conference on Computational Electronics for Wireless Communications, Springer, 2022, pp. 567–581.

A. Gupta, M. Tripathi, S. Muhuri, G. Singal, and N. Kumar, “A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things,” Journal of Information Security and Applications, vol. 68, p. 103259, 2022.

A. B. Amor, S. Jebri, M. Abid, and A. Meddeb, “A Secure Lightweight Mutual Authentication Scheme in Social Industrial IoT Environment,” 2022.

I. Alshawish and A. Al-Haj, “An efficient mutual authentication scheme for IoT systems,” The Journal of Supercomputing, pp. 1–32, 2022.

U. Jain, S. Pirasteh, and M. Hussain, “Lightweight, secure, efficient, and dynamic scheme for mutual authentication of devices in Internet‐of‐Things‐Fog environment,” Concurrency and Computation: Practice and Experience, vol. 35, no. 1, p. e7428, 2023.

H. Park, M. Kim, and J. Seo, “IoT Multi-Phase Authentication System Using Token Based Blockchain,” KIPS Transactions on Computer and Communication Systems, vol. 8, no. 6, pp. 139–150, 2019.

B. B. Rao and A. A. Waoo, “DESIGN A NOVEL APPROACH FOR TOKEN BASED AUTHENTICATION IN IOT NETWORKS.,” Ilkogretim Online, vol. 20, no. 4, 2021.

B. B. Rao and A. A. Waoo, “Advanced System to Identify Users and Devices in IoT using Token-Based Authentication”.

L. Sasirega and C. Shanthi, “LIGHTWEIGHT ECC AND TOKEN BASED AUTHENTICATION MECHANISM FOR WSN-IOT,” Научно-технический вестник информационных технологий, механики и оптики, vol. 22, no. 2, pp. 332–338, 2022.

Z. Xu, W. Liang, K.-C. Li, J. Xu, A. Y. Zomaya, and J. Zhang, “A Time-sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0,” IEEE Transactions on Industrial Informatics, 2021.

N. S. Yadav, M. Rao, D. V. Parameswari, K. L. S. Soujanya, and C. M. Latha, “Accessing Cloud Services Using Token based Framework for IoT Devices.,” Webology, vol. 18, no. 2, 2021.

P. Klimushyn, T. Solianyk, O. Mozhaev, V. Nosov, T. Kolisnyk, and V. Yanov, “HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS,” Innovative Technologies and Scientific Solutions for Industries, no. 4 (18), pp. 31–39, 2021.

Y.-H. Chuang and C.-L. Lei, “PUF Based Authenticated Key Exchange Protocol for IoT Without Verifiers and Explicit CRPs,” IEEE Access, vol. 9, pp. 112733–112743, 2021.

P. Mall, R. Amin, A. K. Das, M. T. Leung, and K.-K. R. Choo, “PUF-based authentication and key agreement protocols for IoT, WSNs and smart grids: a comprehensive survey,” IEEE Internet of Things Journal, 2022.

A. Braeken, “PUF-Based Authentication and Key Exchange for Internet of Things,” IoT Security: Advances in Authentication, pp. 185–204, 2020.

K. Lounis and M. Zulkernine, “Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT,” Digital Threats: Research and Practice, 2021.

A. Shamsoshoara, A. Korenda, F. Afghah, and S. Zeadally, “A survey on physical unclonable function (PUF)-based security solutions for Internet of Things,” Computer Networks, vol. 183, p. 107593, 2020.

C. Wang, D. Wang, G. Xu, and D. He, “Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0,” Science China Information Sciences, vol. 65, no. 1, pp. 1–15, 2022.

M. Mumtaz, J. Akram, and L. Ping, “An RSA based authentication system for smart IoT environment,” in 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), IEEE, 2019, pp. 758–765.

J. Choi, J. Cho, H. Kim, and S. Hyun, “Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things,” Applied Sciences, vol. 10, no. 6, p. 1962, 2020.

X. Wang, X. She, L. Bai, Y. Qing, and F. Jiang, “A novel anonymous authentication scheme based on edge Computing in Internet of vehicles,” Computers, Materials & Continua, vol. 67, no. 3, pp. 3349–3361, 2021.

A. Tewari and B. B. Gupta, “A novel ECC-based lightweight authentication protocol for internet of things devices,” International Journal of High Performance Computing and Networking, vol. 15, no. 1–2, pp. 106–120, 2019.

M. A. Khan, M. T. Quasim, N. S. Alghamdi, and M. Y. Khan, “A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data,” IEEE Access, vol. 8, pp. 52018–52027, 2020.

S. Hussain, S. A. Chaudhry, O. A. Alomari, M. H. Alsharif, M. K. Khan, and N. Kumar, “Amassing the security: An ECC-based authentication scheme for Internet of drones,” IEEE Systems Journal, vol. 15, no. 3, pp. 4431–4438, 2021.

A. Lohachab, “ECC based inter-device authentication and authorization scheme using MQTT for IoT networks,” Journal of Information Security and Applications, vol. 46, pp. 1–12, 2019.

S. Rostampour, M. Safkhani, Y. Bendavid, and N. Bagheri, “ECCbAP: A secure ECC-based authentication protocol for IoT edge devices,” Pervasive and Mobile Computing, vol. 67, p. 101194, 2020.

S. Gabsi, Y. Kortli, V. Beroulle, Y. Kieffer, A. Alasiry, and B. Hamdi, “Novel ECC-based RFID mutual authentication protocol for emerging IoT applications,” IEEE Access, vol. 9, pp. 130895–130913, 2021.

A. K. Das, M. Wazid, A. R. Yannam, J. J. Rodrigues, and Y. Park, “Provably secure ECC-based device access control and key agreement protocol for IoT environment,” IEEE Access, vol. 7, pp. 55382–55397, 2019.

M. Safkhani, N. Bagheri, S. Kumari, H. Tavakoli, S. Kumar, and J. Chen, “RESEAP: an ECC-based authentication and key agreement scheme for IoT applications,” IEEE Access, vol. 8, pp. 200851–200862, 2020.

P. K. Dhillon and S. Kalra, “Secure and efficient ECC based SIP authentication scheme for VoIP communications in internet of things,” Multimedia Tools and Applications, vol. 78, no. 16, pp. 22199–22222, 2019.

C.-T. Chen, C.-C. Lee, and I.-C. Lin, “Correction: Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments,” Plos one, vol. 15, no. 6, p. e0234631, 2020.

B. Hu, W. Tang, and Q. Xie, “A Two-factor Security Authentication Scheme for Wireless Sensor Networks in IoT Environments,” Neurocomputing, 2022.

M. Azrour, J. Mabrouki, A. Guezzaz, and Y. Farhaoui, “New enhanced authentication protocol for internet of things,” Big Data Mining and Analytics, vol. 4, no. 1, pp. 1–9, 2021.

D. Kumar, S. Chand, and B. Kumar, “Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps,” IET Networks, vol. 9, no. 6, pp. 315–325, 2020.

D. Kaur, D. Kumar, K. K. Saini, and H. S. Grover, “An improved user authentication protocol for wireless sensor networks,” Transactions on Emerging Telecommunications Technologies, vol. 30, no. 10, p. e3745, 2019.

J. Oh, S. Yu, J. Lee, S. Son, M. Kim, and Y. Park, “A secure and lightweight authentication protocol for IoT-based smart homes,” Sensors, vol. 21, no. 4, p. 1488, 2021.

P. K. Panda and S. Chattopadhyay, “A secure mutual authentication protocol for IoT environment,” Journal of Reliable Intelligent Environments, vol. 6, no. 2, pp. 79–94, 2020.

M. Dammak, O. R. M. Boudia, M. A. Messous, S. M. Senouci, and C. Gransart, “Token-based lightweight authentication to secure IoT networks,” in 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, 2019, pp. 1–4.

Q. Xie, Z. Ding, and B. Hu, “A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things,” Security and Communication Networks, vol. 2021, 2021.

L. Kou, Y. Shi, L. Zhang, D. Liu, and Q. Yang, “A lightweight three-factor user authentication protocol for the information perception of IoT,” CMC-Computers, Materials & Continua, vol. 58, no. 2, pp. 545–565, 2019.

T. M. Butt, R. Riaz, C. Chakraborty, S. S. Rizvi, and A. Paul, “Cogent and energy efficient authentication protocol for wsn in iot,” Comput. Mater. Contin, vol. 68, pp. 1877–1898, 2021.

V. O. Nyangaresi, “Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography,” Journal of Systems Architecture, vol. 133, p. 102763, 2022.

J. Cui, F. Cheng, H. Zhong, Q. Zhang, C. Gu, and L. Liu, “Multi-factor based session secret key agreement for the Industrial Internet of Things,” Ad Hoc Networks, vol. 138, p. 102997, 2023.

S. Yu and K. Park, “ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor,” Journal of Systems Architecture, vol. 131, p. 102698, 2022.

R. Krishnasrija, A. K. Mandal, and A. Cortesi, “A lightweight mutual and transitive authentication mechanism for IoT network,” Ad Hoc Networks, vol. 138, p. 103003, 2023.

J. Lee et al., “PUFTAP-IoT: PUF-Based Three-Factor Authentication Protocol in IoT Environment Focused on Sensing Devices,” Sensors, vol. 22, no. 18, p. 7075, 2022.

X. Wang, Y. Teng, Y. Chi, and H. Hu, “A Robust and Anonymous Three-Factor Authentication Scheme Based ECC for Smart Home Environments,” Symmetry, vol. 14, no. 11, p. 2394, 2022.

A. K. Yadav, M. Misra, P. K. Pandey, and M. Liyanage, “An EAP-based mutual authentication protocol for WLAN connected IoT devices,” IEEE Transactions on Industrial Informatics, 2022.

P. Bagga, A. Mitra, A. K. Das, P. Vijayakumar, Y. Park, and M. Karuppiah, “Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system,” Computer Communications, vol. 195, pp. 27–39, 2022.

N. Garg, R. Petwal, M. Wazid, D. P. Singh, A. K. Das, and J. J. Rodrigues, “On the design of an AI-driven secure communication scheme for internet of medical things environment,” Digital Communications and Networks, 2022.

S. K. Dwivedi, R. Amin, and S. Vollala, “Design of secured blockchain based decentralized authentication protocol for sensor networks with auditing and accountability,” Computer Communications, vol. 197, pp. 124–140, 2023.

S. Rostampour, N. Bagheri, Y. Bendavid, M. Safkhani, S. Kumari, and J. J. Rodrigues, “An authentication protocol for next generation of constrained Iot systems,” IEEE Internet of Things Journal, vol. 9, no. 21, pp. 21493–21504, 2022.

R. Kumar, S. Singh, and P. K. Singh, “A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs,” Computers and Electrical Engineering, vol. 105, p. 108495, 2023.

B. Khalid, K. N. Qureshi, K. Z. Ghafoor, and G. Jeon, “An improved biometric based user authentication and key agreement scheme for intelligent sensor based wireless communication,” Microprocessors and Microsystems, vol. 96, p. 104722, 2023.

J. Pirayesh, A. Giaretta, M. Conti, and P. Keshavarzi, “A PLS-HECC-based device authentication and key agreement scheme for smart home networks,” Computer Networks, p. 109077, 2022.

R. Hajian, A. Haghighat, and S. H. Erfani, “A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT,” Internet of Things, vol. 18, p. 100493, 2022.

C. Patel, A. K. Bashir, A. A. AlZubi, and R. H. Jhaveri, “EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element,” Digital Communications and Networks, 2022.

Y. Guo, Z. Zhang, and Y. Guo, “SecFHome: Secure remote authentication in fog-enabled smart home environment,” Computer Networks, vol. 207, p. 108818, 2022.

M. A. Khan, B. A. Alzahrani, A. Barnawi, A. Al-Barakati, A. Irshad, and S. A. Chaudhry, “A resource friendly authentication scheme for space–air–ground–sea integrated Maritime Communication Network,” Ocean Engineering, vol. 250, p. 110894, 2022.

A. K. Yadav, M. Misra, P. K. Pandey, K. Kaur, S. Garg, and X. Chen, “A Provably Secure ECC-based Multi-factor 5G-AKA Authentication Protocol”.

M. Azrour, J. Mabrouki, and R. Chaganti, “New efficient and secured authentication protocol for remote healthcare systems in cloud-iot,” Security and Communication Networks, vol. 2021, 2021.

G. Sharma and S. Kalra, “A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications,” Journal of information security and applications, vol. 42, pp. 95–106, 2018.

P. Guo, W. Liang, and S. Xu, “A privacy preserving four-factor authentication protocol for internet of medical things,” Computers & Security, p. 103632, 2023.

Z. Zhang et al., “PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones,” Computer Networks, vol. 238, p. 110118, 2024.

M. Tanveer, A. Badshah, H. Alasmary, and S. A. Chaudhry, “CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things,” Internet of Things, vol. 23, p. 100902, 2023.

S. U. Jan, A. Ghani, A. Alzahrani, S. M. Saqlain, K. Yahya, and H. Sajjad, “Bandwidth and Power Efficient Lightweight Authentication Scheme for Healthcare Systeme,” Journal of King Saud University-Computer and Information Sciences, p. 101601, 2023.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats

https://membership.iapi-indonesia.org/mahjong/https://membership.iapi-indonesia.org/slot-luar-negeri/https://membership.iapi-indonesia.org/thailand/https://membership.iapi-indonesia.org/slot777/https://ktadigitalpgri.org/assets/dist/img/thailand/https://hr.tarunabakti.or.id/zeus-slot/https://membership.iapi-indonesia.org/maxwin/https://www.unjc.cu/depo10k/https://ejournal.aibpmjournals.com/gates-of-olympus/https://nv.nung.edu.ua/https://membership.iapi-indonesia.org/akun-pro-jepang/https://esic.novacanaapaulista.sp.gov.br/uploads/sigmaslot/http://periodicos.unifap.br/https://fjot.anfe.fr/https://classyfm.co.id/frontend/sigmaslot/https://mediapencerahanbangsa.co.id/https://pdamindramayu.co.id/images/luar/https://pdamindramayu.co.id/demo/https://learning.modernland.co.id/api/toto/https://learning.modernland.co.id/git/slot-depo-10k/https://aihc.amexihc.org/toto/https://cstvcnmt.gialai.gov.vn/demo/https://bundamediagrup.co.id/wp-includes/idn/https://fjot.anfe.fr/js/https://sibacargo.co.id/storage/akun-pro-thailand/https://www.rollingcarbon.org/https://www.savebugomaforest.org/https://www.sigmaslot-profil.com/https://www.doxycycline365.com/https://thailottonew.site/https://hipnose.in/https://tennishope.orghttps://vagas.unimedjau.com.br/storage/slot-luar-negeri//https://bundamediagrup.co.id/depo10k/https://bundamediagrup.co.id/akun/demo/https://loa.tsipil-uii.ac.id/sg-gacor/http://snabm.unim.ac.id/depo-10k/http://snabm.unim.ac.id/lib/slot-maxwin/https://appv2.tanahlautkab.go.id/doc/unsign/http://mysimpeg.gowakab.go.id/mysimpeg/maxwin/https://ijatr.polban.ac.id/toto/https://loa.tsipil-uii.ac.id/scatter-hitam/https://simba.cilacapkab.go.id/idnslot/https://sigmawin88.comhttps://perijinan.blitarkota.go.id/assets/jp-gacor/https://perijinan.blitarkota.go.id/data/depo-10k/https://simba.cilacapkab.go.id/api/demo/https://simba.cilacapkab.go.id/api/https://sibacargo.co.id/storage/akun-pro-jepang/https://eu-jr.eu/https://www.remap.ugto.mx/pages/slot-luar-negeri-winrate-tertinggi/http://www.inmedsur.cfg.sld.cu/docs/https://jltl.com.tr/idnslot/https://webscience-journal.net/https://conference.stikesalifah.ac.id/thailand/