Advances in Security, Networks, and Internet of Things
Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20
Article
In addition to substituting low-price and low-quality materials for high-quality materials at the food processing stage, many dishonest businesses risk adulterating chemical materials in products to reduce pro...
Book and Conference Proceedings
Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20
Article
The remote nodes using a selecting relay algorithm (SRA) transmit its dates on wireless sensor networks (WSNs). The algorithm can enhance the network life cycle. It selects an appropriate cooperation node as a...
Chapter and Conference Paper
In this paper, we will show that the authentication protocol for roaming service proposed by Hwang-Chang is vulnerable to Denial-of-Service attack. Most important we also will show that the protocol may cause ...
Chapter and Conference Paper
Cooperative system is a tendency for the future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a h...
Chapter and Conference Paper
Recently, Li, Wang, et al. proposed a secure and efficient authentication protocol which enhances scalability function by using the simple index. This study further demonstrates that their scheme could not res...
Chapter and Conference Paper
In this article, we analyze Tan et al.’s serverless RFID authentication and search protocols. Tan et al. proposed a serverless RFID system to solve this problem without a central database while protecting the ...
Chapter and Conference Paper
It’s easy to access Internet resources in the cloud environment. And it’s important to protect the legal users’ privacy and confidentiality. Recently, Hou and Wang proposed a robust and efficient user authenti...
Chapter and Conference Paper
Based on the group Diffie–Hellman technique, a contributory group key exchange protocol has been proposed by Biswas. Although Biswas claimed the protocol belongs to a contributory group key exchange, Tseng and...
Chapter and Conference Paper
In recent years, product records become more common to merchandize sold in retail stores, but the current product record system used today can’t assure product’s quality after products were transported through...
Chapter and Conference Paper
The user authentication scheme has been widely applied to verify the users’ legality. In order to enhance the security, the smart card has widely used in an authentication scheme. Recently, Liu et al. shown th...
Chapter and Conference Paper
With the prevalence of Internet, eLearning provides a platform for education that enables students to take classes online. While eLearning provides a flexible learning environment, it also has drawbacks. This...
Chapter and Conference Paper
In recent times, Wei et al. proposed a secure smart card based on remote user password authentication scheme. Their scheme is more secure than other schemes. In this article, we will prove their scheme is vul...
Article
Public auditing is an important issue in cloud storage service because a cloud service provider may try to hide management mistakes and system errors from users or even steal or tamper with a user’s data for m...
Article
Two user authentication schemes for multi-server environments have been proposed by Tsai and Wang et al., respectively. However, there are some flaws existing in both schemes. Therefore, a new scheme for impro...
Article
Many protocols have been proposed for solving the user authentication in portable communication system. One of the schemes is based on the delegation concept. Home Location Register (HLR) delegates Mobile Stat...
Article
The access control begins to be widely discussed, especially in organizations and systems with a hierarchical structure. In such a hierarchy, users and their information items divide into a number of disjointe...
Chapter and Conference Paper
Electronic voting (e-voting) is used to solve the problems of traditional paper-based voting and to lower costs. So far, many researchers have offered their secure e-voting systems. However, the existing schem...
Article
In this paper, a new Global System of Mobile Communications (GSM) authentication protocol is proposed to improve some drawbacks of the current GSM authentication protocol for roaming users including: (a) commu...
Article
This paper proposes a simple method that equips UMTS-based telecom companies with a mechanism to prove the records on mobile users’ phone bills. In the history of mobile phone communication, we have seen count...