Research Article

Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments

Table 1

The summary of literature studies.

Literature studiesDescriptionApplication

[10, 11]Security mechanismsFor wireless sensor networks
[12]A lightweight smart card-based authentication schemeFor wireless sensor networks
[13]A two-factor authentication protocolFor wireless sensor networks
[14]Uses ID technology and elliptic curve cryptosystemFor resource-constrained wireless sensor networks
[15]Protects the data securityFor the perception layer
[16, 17]Key agreement protocolsFor lightweight IoT environment
[18]An improved key agreement protocolFor heterogeneous sensor network
[19]Uses chaotic mappingFor IIoT environment
[20]Combines data encryption with game theoryFor privacy protection in IIoT
[21]Uses stake blockchainFor dynamic wireless sensor networks