[1] A. Kumar et al., "A Comprehensive Survey of Authentication Methods in Internet-of-Things and ItsConjunctions," Journal of Network and Computer Applications, vol. 204, Page 103414, 2022.
[2] W. Z. Khan et al., "Edge Computing: A Survey," Future Generation Computer Systems Journal, vol. 97,pp. 219–235, 2019.
[3] K. Cao, Y. Liu, G. Meng and Q. Sun, "An Overview on Edge Computing Research," IEEE AccessJournal, vol. 8, pp. 85714–85728, 2020.
[4] Q. Fan et al., "A Secure and Efficient Authentication and Data Sharing Scheme for Internet of ThingsBased on Blockchain," Journal of Systems Architecture, vol. 117, Page 102112, 2021.
[5] P. M. Chanal and M. S. Kakkasageri, "Security and Privacy in IoT: A Survey," Wireless PersonalCommunications Journal, vol. 115, pp. 1667—1693, 2020.
[6] P. Memarmoshrefi, R. Seibel and D. Hogrefe, "Autonomous Ant-based Public Key AuthenticationMechanism for Mobile Ad-hoc Networks," Journal of Mobile Networks and Applications, vol. 21, pp. 149–160, 2016.
[7] S. S. Rani, S. Pradeep, R. M. Dinesh and S. G. Prabhu, "OTP Based Authentication Model forAutonomous Delivery Systems Using Raspberry Pi," Proc. of the Int. Conf. on Intelligent Controller and Computing for Smart Power (ICICCSP), pp. 1–5, Hyderabad, India, 2022.
[8] M. Mitev et al., "Authenticated Secret Key Generation in Delay-constrained Wireless Systems,"EURASIP Journal of Wireless Communication and Networking, vol. 2020, Article no. 122, 2020.
[9] Y. Wang, T. Nakachi and H. Ishihara, "Edge and Cloud-aided Secure Sparse Representation for FaceRecognition," Proc. of the 27th IEEE European Signal Processing Conf. (EUSIPCO), pp. 1–5, A Coruna, Spain, 2019.
[10] H. Goumidi et al., "Lightweight Secure Authentication and Key Distribution Scheme for VehicularCloud Computing," Journal of Symmetry, vol. 13, no. 3, Article no. 484, pp. 1-29, 2021.
[11] J. Mulholland, M. Mosca and J. Braun, "The Day the Cryptography Dies," IEEE Security Privacy, vol.15, no. 4, pp. 14–21, 2017.
[12] N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, "Quantum Cryptography," Reviews of ModernPhysics, vol. 74, pp. 145–195, 2002.
[13] C. H. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing,"Theoretical Computer Science, vol. 560, pp. 7–11, 2014.
[14] H. Zeyu et al., "Survey on Edge Computing Security," Proc. of the IEEE Int. Conf. on Big Data,Artificial Intelligence and Internet of Things Engineering (ICBAIE), pp. 96–105, Fuzhou, China, 2020.
[15] X. Wang et al., "Survey on Blockchain for Internet of Things," Journal of Computer Communications,Elsevier, vol. 136, pp. 10–29, 2019.
[16] M. A. Uddin, A. Stranieri, I. Gondal and V. Balasubramanian, "A Survey on the Adoption ofBlockchain in IoT: Challenges and Solutions," Blockchain: Research and Applications, vol. 2, no. 2, pp. 1–49, 2021.
[17] Y. Zhang et al., "Smart Contract-based Access Control for the Internet of Things," IEEE Internet ofThings Journal, vol. 6, no. 2, pp. 1594– 1605, 2018.
[18] K. Ekerta, "Quantum Cryptography Bases on Bell’s Theorem," Physical Review Letters, vol. 67, pp.661–664, 1991.
[19] V. Scarani et al., "Security Aspect of Practical Quantum Key Distribution," Reviews of ModernPhysics, vol. 81, no. 3, pp. 1301–1350, 2009.
[20] U. Khalid et al., "A Decentralized Lightweight Blockchain-based Authentication Mechanism for IoTSystems," Cluster Computing, vol. 23, pp. 2067–2087, 2020.
[21] K. Hameed, S. Garg, M. B. Amin and B. Kang, "A Formally Verified Blockchain-based DecentralizedAuthentication Scheme for the Internet of Things," Journal of Supercomputing, vol. 77, pp. 14461—14501, 2021.
[22] A. A. Al-Saggaf, T. Sheltami, H. Alkhzaimi and G. Ahmed, "Lightweight Two-factor-based UserAuthentication Protocol for IoT-enabled Healthcare Ecosystem in Quantum Computing," Arab Journal for Science and Engineering, vol. 48, pp. 2347–2357, 2023.
[23] H. Abulkasim et al., "Authenticated Secure Quantum-based Communication Scheme in Internet-of-Drones Deployment," IEEE Access Journal, vol. 10, pp. 94963–94972, 2022.
[24] J. Wu, Z. Jin, G. Li, Z. Xu, C. Fan and Y. Zheng, "Design of Vehicle Certification Schemes in IoVBased on Blockchain," World Wide Web Journal, vol. 25, pp. 2241—2263, 2022.
[25] G. Cheng, Y. Chen, S. Deng, H. Gao and J. Yin, "A Blockchain-based Mutual Authentication Schemefor Collaborative Edge Computing," IEEE Transactions on Computational Social Systems, vol. 9, no. 1, pp. 146–158, 2022.
[26] A. K. Sahu, S. Sharma and D. Puthal, "Lightweight Multi-party Authentication and Key AgreementProtocol in IoT-based E-Healthcare Service," ACM Transactions on Multimedia Computing, Communications and Applications, vol. 17, pp. 1–20, 2021.
[27] P. Nag, P. Chandrakar and K. Chandrakar, "An Improved Two-factor Authentication Scheme forHealthcare System," Procedia Computer Science, vol. 218, pp. 1079–1090, 2023.
[28] S. Sathyadevan, K. Achuthan, R. Doss and L. Pan, "Protean Authentication Scheme – A Time-boundDynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments," IEEE Access Journal, vol. 7, pp. 92419–92435, 2019.
[29] A. Shahidinejad and J. Abawajy, "Decentralized Lattice-based Device-to-device Authentication for theEdge-enabled IoT," IEEE Systems Journal, vol. 17, no. 4, pp. 6623–6633, 2023.
[30] A. Shahidinejad, J. Abawajy and S. Huda, "Anonymous Lattice-based Authentication Protocol forVehicular Communications," Vehicular Communications, vol. 48, Page 100803, 2024.
[31] D. Stucki et al., "Long-term Performance of the SwissQuantum Quantum Key Distribution Network ina Field Environment," New Journal of Physics, vol. 13, no. 12, Page 123001, 2011.
[32] Toshiba, "QKD Technology to Semiconductor Chip," [Online], Available: https://news.toshiba.com/press-releases/press-release-details/2021/Toshiba-Shrinks-Quantum-Key-Distribution-Technology-to-a-Semiconductor-Chip/default.aspx.
[33] R. Canetti and H. Krawczyk, "Analysis of Key-exchange Protocols and Their Use for Building SecureChannels," Proc. of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2001), pp. 453–474, Springer, 2001.
[34] N. D. Sarier, "Multimodal Biometric Authentication for Mobile Edge Computing," InformationSciences, vol. 573, pp. 82–99, 2021.
[35] H. Goswami and H. Choudhury, "Remote Registration and Group Authentication of IoT Devices in 5GCellular Network," Computers Security Journal, vol. 120, Page 102806, 2022.
[36] A. M. Almuhaideb and K. S. Alqudaihi, "A Lightweight Three-factor Authentication Scheme forWHSN Architecture," Sensors Journal, vol. 20, no. 23, Page 6860, 2020.
[37] S. Uppuluri and G. Lakshmeeswari, "Secure User Authentication and Key Agreement Scheme for IoTDevice Access Control Based Smart Home Communications," Wireless Network Journal, vol. 29, pp. 1333—1354, 2023.
[38] Wu, Tsu-Yang, Zhiyuan Lee, Lei Yang, Jia-Ning Luo and Raylin Tso, "Provably Secure AuthenticationKey Exchange Scheme Using Fog Nodes in Vehicular Ad Hoc Networks," The Journal of Supercomputing vol. 77, no. 7, pp. 6992-7020, 2021.
[39] M. Hamada, S. A. Salem and F. M. Salem, "LAMAS: Lightweight Anonymous Mutual AuthenticationScheme for Securing Fog Computing Environments," Ain Shams Engineering Journal, vol. 13, no. 6, p. 101752, 2022.
[40] I. Aciobanitei, R. I. Guinea and M. L. Pura, "AVISPA versus AVANTSSAR in the Model Checking ofSecure Communication Protocols," Proc. of the 15th Int. Joint Conf. on e-Business and Telecomm. (ICETE 2018), vol. 2: SECRYPT, pp. 520-525, DOI: 10.5220/0006887905200525, 2018.