Abstract: Remote authentication has been extensively studied over the past few decades, with password-based authentication being a common approach since Lamport’s 1981 proposal of a password-based ...
Abstract: To ensure the secure access control mechanisms for the wireless sensor networks (WSNs) with a 5G-enabled Internet of Things (IoT) system, very recently, Sahoo et al. (IEEE Internet of Things ...