1.
S.U. Jan, I. A. Abbasi, M. A. Alqarni , “LMAS-SHS: A Lightweight Mutual Authentication Scheme for Smart Home Surveillance”, IEEE Access , vol. 10, 2022, pp. 52791 – 52803. DOI: 10.1109/ACCESS.2022.3174558
2.
S. Zou, Q. Cao, C. Wang,Z. Huang,G. Xu, “A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT”, IEEE Systems Journal ,vol. 16, no. 3, 2022, pp. 4938 – 4949. DOI: 10.1109/JSYST.2021.3127438
3.
N. Amraoui & B. Zouari, “Anomalous behavior detection-based approach for authenticating smart home system users”, International Journal of Information Security, Springer, vol. 21, 2022, pp.611–636.https://doi.org/10.1007/s10207-021-00571-6
4.
S. Yu, N. Jho, Y. Park, “Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes”, IEEE Access ,vol. 9, 2021, pp. 126186 – 126197. DOI: 10.1109/ACCESS.2021.3111443
5.
S. Majumder, S. Ray, D. Sadhukhan, M. K. Khan & M. Dasgupta, “ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things”, Wireless Personal Communications, Springer, vol. 116, 2021, pp. 1867–1896. https://doi.org/10.1007/s11277-020-07769-2
6.
Y. Cho, J. Oh, D. Kwon, S. Son, J. Lee, and Y. Park, “A Secure and Anonymous User Authentication Scheme for IoT-Enabled Smart Home Environments Using PUF”, IEEE Access, vol.10, 2022, pp. 101330 – 101346. DOI: 10.1109/ACCESS.2022.3208347
7.
R. A. Devi and A.R. Arunachalam, “Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM”, High-Confidence Computing, Elsevier, vol. 3, no. 2, 2023, pp. 1-14. https://doi.org/10.1016/j.hcc.2023.100117
8.
V. Kumar, N. Malik, J. Singla, N. Z. Jhanjhi, F. Amsaad and A.Razaque, “Light Weight Authentication Scheme for Smart Home IoT Devices”, Cryptography , vol. 6, no.3, 2022, Pages 1-15. https://doi.org/10.3390/cryptography6030037
9.
P. Kumar & L. Chouhan, “A secure authentication scheme for IoT application in smart home”, Peer-to-Peer networking and Applications, Springer, Volume 14, 2021, pages 420-438. https://doi.org/10.1007/s12083-020-00973-8
10.
H. Luo , C. Wang , H. Luo, F. Zhang, F. Lin , and G. Xu, “G2F: A Secure User Authentication for Rapid Smart Home IoT Management”, IEEE Internet of Things Journal, vol. 8, no.13, 2021, pp. 10884 – 10895. DOI: 10.1109/JIOT.2021.3050710
11.
T-Y. Wu, Q. Meng, Y-C. Chen, S.Kumari and C-M Chen, “Toward a Secure Smart-Home IoT Access Control Scheme Based on Home Registration Approach”, Mathematics, vol. 11, no.9, pp. 1-15. https://doi.org/10.3390/math11092123
12.
C. Sisavath and L. Yu, “Design and implementation of security system for smart home based on IOT technology”, Procedia Computer Science, Elsevier, vol. 183, 2021, pp. 4-13. https://doi.org/10.1016/j.procs.2021.02.023
13.
S. Sohail, Z. Fan, X. Gu, F. Sabrina, “Multi-tiered Artificial Neural Networks model for intrusion detection in smart homes”, Intelligent Systems with Applications, Elsevier, vol. 16, 2022, pp. 1-14. https://doi.org/10.1016/j.iswa.2022.200152
14.
A. Huszti, S. Kovács, N. Oláh, “callable, password-based and threshold authentication for smart homes”, International Journal of Information Security, Springer, vol. 21, 2022, pp. 707–723. https://doi.org/10.1007/s10207-022-00578-7
15.
W. Iqbal, H. Abbas, B. Rauf, Y. Abbas, F. Amjad, A. Hemani, “PCSS: Privacy Preserving Communication Scheme for SDN Enabled Smart Homes”, IEEE Sensors Journal, vol. 22, no. 18, 2022, pp.17677 – 17690. DOI: 10.1109/JSEN.2021.3087779
16.
S. Yu, A. K. Das, and Y. Park, “ALAM: Anonymous Lightweight Authentication Mechanism for SDN Enabled Smart Homes”, IEEE Access, vol. 9, 2021, pp. 49154 - 49159. DOI: 10.1109/ACCESS.2021.3068723
17.
A. Qashlan, P. N. X. He and M. Mohanty, “Privacy-Preserving Mechanism in Smart Home Using Blockchain”, IEEE Access, vol. 9, 2021, pp. 103651 – 103669. DOI: 10.1109/ACCESS.2021.3098795
18.
B. A. Alzahrani, A.Barnawi, A. Albarakati, A.Irshad , M. A. Khan , and S. A. Chaudhry, “SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes”, Wireless Communications and Mobile Computing, Hindawi, vol.2022, 2022, pp. 1-12. https://doi.org/10.1155/2022/8669941
19.
B. Liu, X. Yao, K. Guo, P. Zhu, “Consortium Blockchain Based Lightweight Message Authentication and Auditing in Smart Home”, IEEE Access ,vol. 11, 2023, pp. 68473 – 68485. DOI: 10.1109/ACCESS.2023.3293401
20.
S. Uppuluri and G. Lakshmeeswari, “Secure user authentication and key agreement scheme for IoT device access control based smart home communications”, Wireless Networks, Springer, vol. 29, 2023, pp.1333–1354. https://doi.org/10.1007/s11276-022-03197-1
21.
H. E. Makhtoum, Y. Bentaleb, “Secure and Lightweight Authentication Protocol for Smart Metering System”, International Journal of Advanced Computer Science and Applications(IJACSA), vol. 13, no. 11, 2022, pp. 1-8. DOI: 10.14569/IJACSA.2022.0131191
22.
X. Zhao, B. Zhong and Z. Cui, “Design of a Decentralized Identifier-Based Authentication and Access Control Model for Smart Homes”, Electronics, vol. 12, no. 15, 2023, pp. 1-20. https://doi.org/10.3390/electronics12153334
23.
M. Fariss, H. E. Gafif, A.Toumanari, “A Lightweight ECC-based Three-Factor Mutual Authentication and Key Agreement Protocol for WSNs in IoT”, International Journal of Advanced Computer Science and Applications (IJACSA),vol. 13, no. 6, 2022, pp. 1-11.
DOI: 10.14569/IJACSA.2022.0130660
24.
S. Amanlou, K. A.A.Bakar, “Lightweight Security Mechanism over MQTT Protocol for IoT Devices”, International Journal of Advanced Computer Science and Applications (IJACSA),vol. 11, no. 7, 2020, pp.1-6. DOI: 10.14569/IJACSA.2020.0110726
25.
H.Alasmary, and M. Tanveer, “ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework”, Mathematics, vol.11, no. 16, pp. 1-25. https://doi.org/10.3390/math11163450.