A Survey of Authentication Schemes in the Internet of Things

[1]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[2]  Chun-I Fan,et al.  Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.

[3]  Lisandro Zambenedetti Granville,et al.  A DTLS-based security architecture for the Internet of Things , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[4]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[5]  Mohamed Abid,et al.  An efficient scheme for anonymous communication in IoT , 2015, 2015 11th International Conference on Information Assurance and Security (IAS).

[6]  Sheetal Kalra,et al.  Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..

[7]  Ruoshan Kong The Simulation for Network Mobility Based on NS2 , 2008, 2008 International Conference on Computer Science and Software Engineering.

[8]  Muhammad Khurram Khan,et al.  An efficient remote mutual authentication scheme using smart mobile phone over insecure networks , 2015, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA).

[9]  Biplab Sikdar,et al.  A Light-Weight Mutual Authentication Protocol for IoT Systems , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[10]  Xiaojiang Du,et al.  An Location-aware Authentication Scheme for Cross-domain Internet of Thing Systems , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).

[11]  Fabiano Hessel,et al.  The importance of a standard securit y archit ecture for SOA-based iot middleware , 2015, IEEE Communications Magazine.

[12]  Ping Wang,et al.  Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks , 2014, Ad Hoc Networks.

[13]  L. Javier García-Villalba,et al.  SDN: Evolution and Opportunities in the Development IoT Applications , 2014, Int. J. Distributed Sens. Networks.

[14]  Fadi Al-Turjman,et al.  CAR Approach for the Internet of Things , 2016, Canadian Journal of Electrical and Computer Engineering.

[15]  Ruhul Amin,et al.  A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks , 2016, Ad Hoc Networks.

[16]  Ning Zhang,et al.  S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol , 2017, IEEE Internet of Things Journal.

[17]  Jian Shen,et al.  An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment , 2017, J. Netw. Comput. Appl..

[18]  Chin-Chen Chang,et al.  Notes on "Secure authentication scheme for IoT and cloud servers" , 2017, Pervasive Mob. Comput..

[19]  Chien-Ming Chen,et al.  A secure authentication scheme for Internet of Things , 2017, Pervasive Mob. Comput..

[20]  Inwhee Joe,et al.  An Efficient Device Authentication Protocol Without Certification Authority for Internet of Things , 2016, Wirel. Pers. Commun..

[21]  Burak Kantarci,et al.  Cloud-centric multi-level authentication as a service for secure public safety device networks , 2016, IEEE Communications Magazine.

[22]  Giuseppe Piro,et al.  Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption , 2017, IEEE Embedded Systems Letters.

[23]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[24]  Daniel W. Engels,et al.  Black SDN for the Internet of Things , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.

[25]  Hannu Tenhunen,et al.  International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .

[26]  Sanaa Taha,et al.  An anonymous mutual authentication scheme for healthcare RFID systems , 2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[27]  Ruhul Amin,et al.  Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..

[28]  Mohammad S. Obaidat,et al.  Security analysis and design of an efficient ECC-based two-factor password authentication scheme , 2016, Secur. Commun. Networks.

[29]  Bryan Scotney,et al.  Smart City Architecture and its Applications Based on IoT , 2015, ANT/SEIT.

[30]  Ricardo Neisse,et al.  A Model-Based Security Toolkit for the Internet of Things , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[31]  Atul Kumar,et al.  A Novel Approach for Secure Mobile-Voting using Biometrics in Conjunction with Elliptic Curve Crypto-Stegano Scheme , 2011 .

[32]  Xiong Li,et al.  A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks , 2015, Comput. Electr. Eng..

[33]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[34]  Wei-Kuan Shih,et al.  Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data , 2013, IET Inf. Secur..

[35]  Soma Bandyopadhyay,et al.  Why not keep your personal data secure yet private in IoT?: Our lightweight approach , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[36]  Noor Zaman,et al.  Proposing secure and lightweight authentication scheme for IoT based E-health applications , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[37]  Liping Zhang,et al.  Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement , 2018, IEEE Transactions on Industrial Electronics.

[38]  Walid Saad,et al.  On the authentication of devices in the Internet of things , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[39]  Ruhul Amin,et al.  Anonymity preserving secure hash function based authentication scheme for consumer USB mass storage device , 2015, Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT).

[40]  Xiong Li,et al.  Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems , 2015, Journal of Medical Systems.

[41]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[42]  Subhasish Dhal,et al.  A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System , 2018, Comput. Secur..