An anonymous secure authentication protocol for IIoT (ASAP-IIOT) to implement mutual authentication between the application servers and users. The ASAP-IIOT provides the capability to ensure user anonymity in secure communication.
Feb 15, 2024 · In this paper, we propose a lightweight anonymous authentication protocol to preserve privacy for IIoT users, enabling secure IIoT communication ...
Feb 10, 2024 · In this paper, we propose a lightweight anonymous authentication protocol to preserve privacy for IIoT users, enabling secure IIoT communication ...
In this paper, we propose a lightweight anonymous authentication protocol to preserve privacy for IIoT users, enabling secure IIoT communication. The protocol ...
A lightweight anonymous authentication protocol to preserve privacy for IIoT users, enabling secure IIoT communication is proposed and validated to ...
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things ... protocol to preserve privacy for IIoT users, enabling secure IIoT ...
In this paper, we propose a lightweight anonymous authentication protocol to preserve privacy for IIoT users, enabling secure IIoT communication. The protocol ...
People also ask
What is a three factor anonymous user authentication scheme for Internet of Things environments?
Which is an authentication protocol which is used by the PPP to authenticate passwords?
Jan 1, 2023 · The proposed scheme uses the IIoT as the application scenario and proposes a novel three-factor authentication and lightweight remote user identity ...
ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things ... protocol to preserve privacy for IIoT users, enabling secure IIoT ...
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks.