Articles with "lightweight authentication" as a keyword



Photo by lensingmyworld from unsplash

ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-02349-5

Abstract: In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739–8752, 2019; https://doi.org/10.1109/JIOT.2019.2931372 ) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session key between a user and a smart… read more here.

Keywords: ilas iot; improved lightweight; scheme; lightweight authentication ... See more keywords
Photo by dtopkin1 from unsplash

A lightweight authentication and privacy-preserving scheme for VANETs using TESLA and Bloom Filters

Sign Up to like & get
recommendations!
Published in 2018 at "ICT Express"

DOI: 10.1016/j.icte.2017.12.001

Abstract: Abstract In Vehicular Ad hoc Networks (VANETs), broadcasted beacon messages are critical as most safety applications rely on them. However, the design of a secure broadcast authentication faces many security and privacychallenges as vehicles are… read more here.

Keywords: lightweight authentication; authentication; privacy preserving; bloom filters ... See more keywords
Photo by 2hmedia from unsplash

A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3070683

Abstract: The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an… read more here.

Keywords: resource; authentication protocol; authentication; security ... See more keywords
Photo by markusspiske from unsplash

Design and Analysis of Lightweight Authentication Protocol for Securing IoD

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3076692

Abstract: The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones’ navigation services. The main entities in IoD are drones,… read more here.

Keywords: authentication protocol; protocol securing; authentication; protocol ... See more keywords
Photo by noaa from unsplash

A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2017.2737630

Abstract: In the emerging industrial Internet of Things (IIoT) era, machine-to-machine (M2M) communication technology is considered as a key underlying technology for building IIoT environments, where devices (e.g., sensors, actuators, and gateways) are enabled to exchange… read more here.

Keywords: m2m; m2m communications; environment; mechanism ... See more keywords
Photo by davidvives from unsplash

Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3138989

Abstract: Wireless body area networks (WBANs) technology nowadays has become a promising networking paradigm in the Internet of Things (IoT) as it can provide people with high quality of life and high level of medical service.… read more here.

Keywords: authentication; mobile edge; secure lightweight; lightweight authentication ... See more keywords
Photo by lensingmyworld from unsplash

A Novel Revocable Lightweight Authentication Scheme for Resource-Constrained Devices in Cyber–Physical Power Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3221943

Abstract: The existing identity security schemes (e.g., based on bilinear pairing) have high computational complexity and large bytes of variables, which results in high computation and communication costs. It is difficult to apply the schemes to… read more here.

Keywords: authentication; authentication scheme; lightweight authentication; security ... See more keywords
Photo by arthurbizkit from unsplash

Blockchain-Based Lightweight Authentication for Resilient UAV Communications: Architecture, Scheme, and Future Directions

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Wireless Communications"

DOI: 10.1109/mwc.002.2100594

Abstract: Representing a new stage in the industrial value chain, Industry 4.0 paves the way to the future eco-systems of industrial innovation, where cyber-physical systems (e.g., smart machines) form its basis by bridging the physical and… read more here.

Keywords: authentication; uav networks; blockchain based; lightweight authentication ... See more keywords
Photo by topdata from unsplash

LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3148825

Abstract: As embedded integrated electronic systems (EIESs) become more pervasive (including in mission-critical applications), the need to ensure the security of data exchange in such a system against various malicious activities becomes more pronounced. However, designing… read more here.

Keywords: electronic systems; lightweight authentication; embedded integrated; integrated electronic ... See more keywords
Photo by moeedb247 from unsplash

An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"

DOI: 10.1109/tsmc.2019.2957175

Abstract: Until now, the pseudonym ID and one-time hash chain as the key technologies solve anonymous and forward secrecy properties, respectively, in lightweight authentication protocols for wireless sensor networks (WSNs) environment. However, both techniques have to… read more here.

Keywords: authentication scheme; lightweight authentication; authentication; sensor networks ... See more keywords
Photo by hudsoncrafted from unsplash

Anonymous and Lightweight Authentication for Secure Vehicular Networks

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2017.2744182

Abstract: Authentication is an important issue in vehicular ad hoc network. However, existing studies have not addressed some issues like efficiency and anonymity. In this paper, we propose an anonymous and lightweight authentication based on smart… read more here.

Keywords: lightweight authentication; authentication; authentication secure; anonymous lightweight ... See more keywords