Research Article
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
Table 1
The summary of literature studies.
| | Literature studies | Description | Application |
| | [10, 11] | Security mechanisms | For wireless sensor networks | | [12] | A lightweight smart card-based authentication scheme | For wireless sensor networks | | [13] | A two-factor authentication protocol | For wireless sensor networks | | [14] | Uses ID technology and elliptic curve cryptosystem | For resource-constrained wireless sensor networks | | [15] | Protects the data security | For the perception layer | | [16, 17] | Key agreement protocols | For lightweight IoT environment | | [18] | An improved key agreement protocol | For heterogeneous sensor network | | [19] | Uses chaotic mapping | For IIoT environment | | [20] | Combines data encryption with game theory | For privacy protection in IIoT | | [21] | Uses stake blockchain | For dynamic wireless sensor networks |
|
|