Articles with "based authentication" as a keyword



Photo by dtopkin1 from unsplash

Privacy preserving biometric authentication using Chaos on remote untrusted server

Sign Up to like & get
recommendations!
Published in 2021 at "Measurement"

DOI: 10.1016/j.measurement.2021.109257

Abstract: Abstract Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT)… read more here.

Keywords: authentication; privacy preserving; untrusted server; based authentication ... See more keywords
Photo from wikipedia

Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2826518

Abstract: The upcoming Fifth Generation (5G) networks can provide ultra-reliable ultra-low latency vehicle-to-everything for vehicular ad hoc networks (VANET) to promote road safety, traffic management, information dissemination, and automatic driving for drivers and passengers. However, 5G-VANET… read more here.

Keywords: based authentication; authentication; pseudonymous authentication; dos attacks ... See more keywords
Photo from wikipedia

A Novel Moving Target Defense Scheme With Physical Unclonable Functions-Based Authentication

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3154012

Abstract: Recent studies have discovered possible security issues on Supervisory Control and Data Acquisition systems (SCADA) in the critical architecture and focus on developing protection mechanisms on this system. Moving Target Mobile IPv6 Defense II is… read more here.

Keywords: moving target; scheme; based authentication; security ... See more keywords
Photo from wikipedia

A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3204271

Abstract: Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee secure communication through unfavorable and unsafe channels. The speedy development in wireless communication and drone-assisted networking technology has miserable significance in many areas, including wildlife monitoring,… read more here.

Keywords: authentication; authentication scheme; verifiably secure; scheme ... See more keywords
Photo from wikipedia

A Lightweight BT-Based Authentication Scheme for Illegal Signatures Identification in VANETs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3232301

Abstract: Research related to vehicular ad hoc networks (VANETs) has received significant attention in recent years. Despite all the advantages, the security and privacy in VANETs still become the main challenge that is widely open to… read more here.

Keywords: authentication scheme; illegal signatures; scheme; verification ... See more keywords
Photo from wikipedia

Novel Strong-PUF-Based Authentication Protocols Leveraging Shamir’s Secret Sharing

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3065836

Abstract: Physical unclonable function (PUF) has emerged as an attractive hardware primitive for lightweight authentication in the Internet of Things (IoT). However, strong-PUF-based authentication schemes are threatened by powerful machine learning attacks. Therefore, dedicated lightweight protocols… read more here.

Keywords: authentication; strong puf; puf based; protocol ... See more keywords
Photo by larskienle from unsplash

On the Security of an ECC-Based Authentication Scheme for Internet of Drones

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2022.3162604

Abstract: We demonstrate that the ECC-based authentication scheme for internet of drones (short for IoD-AS, published in IEEE Systems Journal, Hussain et al., 2021) Amassing the security: An ECC-based authentication scheme for Internet of Drones) fails… read more here.

Keywords: authentication scheme; scheme internet; internet drones; ecc based ... See more keywords
Photo from wikipedia

CurIAs: Current-Based IC Authentication by Exploiting Supply Current Variations

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2022.3158075

Abstract: Physical unclonable functions (PUFs) have emerged as one of the most notable hardware primitives to mitigate the ever-growing global issue of counterfeiting and cloning of integrated circuits (ICs) in recent times. PUFs exploit the intrinsic… read more here.

Keywords: supply; current based; supply current; curias current ... See more keywords
Photo by scottwebb from unsplash

A Novel MAC-Based Authentication Scheme (NoMAS) for Internet of Vehicles (IoV)

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2023.3242291

Abstract: The fully dynamic dense environment of the Internet of Vehicles (IoV) and conditions like high traffic jams, collisions, and uneven road conditions increase the communication messages. Consequently, the computation and communication costs of the IoV… read more here.

Keywords: mac based; security; scheme; internet vehicles ... See more keywords
Photo from wikipedia

Secret sharing-based authentication and key agreement protocol for machine-type communications

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Distributed Sensor Networks"

DOI: 10.1177/1550147719841003

Abstract: One of the main challenges for the development of the Internet of Things is the authentication of large numbers of devices/sensors, commonly served by massive machine-type communications, which jointly with long-term evolution has been considered… read more here.

Keywords: based authentication; type communications; authentication key; authentication ... See more keywords