A secure mutual authentication protocol for IoT environment

[1]  Sudipta Chattopadhyay,et al.  An improved authentication and security scheme for LTE/LTE-A networks , 2020, J. Ambient Intell. Humaniz. Comput..

[2]  Dariush Abbasinezhad-Mood,et al.  Novel Anonymous Key Establishment Protocol for Isolated Smart Meters , 2020, IEEE Transactions on Industrial Electronics.

[3]  Dariush Abbasinezhad-Mood,et al.  Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme , 2019, Future Gener. Comput. Syst..

[4]  Issa Traoré,et al.  Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain , 2019, J. Inf. Secur. Appl..

[5]  Sudipta Chattopadhyay,et al.  A modified PKM environment for the security enhancement of IEEE 802.16e , 2019, Comput. Stand. Interfaces.

[6]  Shefalika Ghosh Samaddar,et al.  A Robust Lightweight ECC-Based Three-Way Authentication Scheme for IoT in Cloud , 2019 .

[7]  Xiong Li,et al.  A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[8]  Fan Wu,et al.  A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[9]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[10]  Dariush Abbasinezhad-Mood,et al.  Efficient Design of a Novel ECC-Based Public Key Scheme for Medical Data Protection by Utilization of NanoPi Fire , 2018, IEEE Transactions on Reliability.

[11]  Dariush Abbasinezhad-Mood,et al.  Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps , 2018, IEEE Transactions on Industrial Informatics.

[12]  Mauro Conti,et al.  Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.

[13]  S. Bhuvaneshwari,et al.  Enhanced mutual authentication scheme for cloud of things , 2018 .

[14]  Xiong Li,et al.  An improved and provably secure three-factor user authentication scheme for wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..

[15]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[16]  Chien-Ming Chen,et al.  A secure authentication scheme for Internet of Things , 2017, Pervasive Mob. Comput..

[17]  Sheetal Kalra,et al.  Secure multi‐factor remote user authentication scheme for Internet of Things environments , 2017, Int. J. Commun. Syst..

[18]  Chin-Chen Chang,et al.  Notes on "Secure authentication scheme for IoT and cloud servers" , 2017, Pervasive Mob. Comput..

[19]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[20]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[21]  Dindayal Mahto,et al.  Security Analysis of Elliptic Curve Cryptography and RSA , 2016 .

[22]  Sheetal Kalra,et al.  Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..

[23]  Swapnoneel Roy,et al.  Security Analysis of ECC Based Authentication Protocols , 2015, 2015 International Conference on Computational Intelligence and Communication Networks (CICN).

[24]  Antonio Puliafito,et al.  A utility paradigm for IoT: The sensing Cloud , 2015, Pervasive Mob. Comput..

[25]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[26]  Sherali Zeadally,et al.  An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.

[27]  Ola Angelsmark,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) Calvin – Merging Cloud and IoT , 2015 .

[28]  Antonio Pescapè,et al.  On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[29]  Chih-Ming Hsiao,et al.  A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.

[30]  M. Farash,et al.  A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks , 2014, The Journal of Supercomputing.

[31]  Ethiopia Nigussie,et al.  An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems , 2014, ANT/SEIT.

[32]  Lin Sun,et al.  Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications , 2015, IACR Cryptol. ePrint Arch..

[33]  Kuo-Yu Tsai,et al.  Two ID-based authenticated schemes with key agreement for mobile environments , 2013, Journal of Supercomputing.

[34]  Almudena Alcaide,et al.  Anonymous authentication for privacy-preserving IoT target-driven applications , 2013, Comput. Secur..

[35]  Haider Abbas,et al.  A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata , 2013, J. Netw. Comput. Appl..

[36]  Roel Peeters,et al.  Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol , 2013, IACR Cryptol. ePrint Arch..

[37]  G. P. Biswas,et al.  A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2011, J. Syst. Softw..

[38]  Suresh C. Mehrotra,et al.  A Review on Elliptic Curve Cryptography for Embedded Systems , 2011, ArXiv.

[39]  A. Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[40]  Chin-Chen Chang,et al.  An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2009, Comput. Secur..

[41]  Sebastian Wallner,et al.  Secure communication in microcomputer bus systems for embedded devices , 2008, J. Syst. Archit..

[42]  Luca Viganò,et al.  Automated Security Protocol Analysis With the AVISPA Tool , 2006, MFPS.

[43]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[44]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).