Search
Search Results
-
An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server
The internet of things (IoT) is a complex network system with applications in all walks of life. However, there are various risks in the process of... -
PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks
Internet of Things (IoTs) is a promising technology that combines communication and data networking. Integration of Smart Grids (SGs) and IoT will...
-
Identity-Based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs
Vehicle Ad Hoc Networks (VANETs) play a pivotal role in intelligent transportation systems, offering dynamic communication between vehicles, road... -
Enhancing security of biometrics based authentication framework for DRM system
Due to current advancements in digital and Internet technologies, digital content theft has grown to a significant degree. Digital rights management...
-
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
Over the last decade, technological advances in smart grids have permitted the modernization of legacy electricity networks. As Internet of Things...
-
Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
The password-based authentication mechanism is considered as the oldest and the most used method. It is easy to implement, and it does not require...
-
TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments
A mechanism of fog computing environment is employed in order to enhance the cloud computing services toward the edge devices in a range of locations...
-
Trusted Introductions for Secure Messaging
Although today’s most prevalent end-to-end encrypted messaging platforms using the Signal Protocol perform opportunistic encryption and provide... -
An efficient hybrid multifactor mutual authentication and session key agreement scheme for patient monitoring system using IoMT
The Internet of Medical Things (IoMT) provides such flexibility in our society where anyone can get medical treatment at any time, from anywhere....
-
A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN
Wireless Medical Sensor Network (WMSN) is a kind of Ad-hoc Network that is used in the health sector to continuously monitor patients’ health...
-
Fuzzy miner selection toward Blockchain-based secure communication using multifactor authentication
The medical cyber-physical system utilizes various Internet of Medical Things (IoMT) devices that are connected to the network for real-time...
-
SUACC-IoT: secure unified authentication and access control system based on capability for IoT
With the widespread use of Internet of Things (IoT) in various applications and several security vulnerabilities reported in them, the security...
-
IFTTT-based secure smart farming monitoring system: data integrity and agricultural optimization
Agricultural monitoring is pivotal for optimizing crop yields and farm productivity, yet traditional systems face drawbacks such as limited coverage...
-
Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use
User attributes can be authenticated by an attribute-based anonymous credential while kee** the anonymity of the user. Most attribute-based... -
SoK: Game-Based Security Models for Group Key Exchange
Group key exchange (GKE) protocols let a group of users jointly establish fresh and secure key material. Many flavors of GKE have been proposed,... -
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment
Due to the massive increase in the Internet of Things (IoT) devices in various applications requiring an IoT–cloud environment, the network latency...
-
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
With the widespread use of network infrastructures such as 5G and low-power wide-area networks, a large number of the Internet of Things (IoT) device...
-
An enhanced and provably secure authentication protocol using Chebyshev chaotic maps for multi-server environment
Multiserver authentication requires users to have only one-time registration for accessing different permissible services securely from various...
-
A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments
The distributed authentication of a large number of resource-constrained power terminal devices (PTDs) is crucial for ensuring the security of the...
-
Security assessment and improvement of smart grid NIKE protocol
Advanced metering infrastructure (AMI) is a fundamental functional module of Smart Grid that supports mutual communication between customers and...