Questioning the Security of Three Recent Authentication and Key Agreement Protocols

Providing the desired security for constrained devices in the edge of Internet of Things (IoT) systems is a challenging task. Given that those devices are in shortage of the area and energy, many lightweight and ultra-lightweight protocols have been proposed so far in the literature. On the other ha...

Full description

Bibliographic Details
Main Authors: Amir Masoud Rahmani, Mokhtar Mohammadi, Shima Rashidi, Jan Lansky, Stanislava Mildeova, Masoumeh Safkhani, Saru Kumari, Mehdi Hosseinzadeh
Format: Article
Language:English
Published: IEEE 2021-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9475067/