Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-02349-5
Abstract: In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739–8752, 2019; https://doi.org/10.1109/JIOT.2019.2931372 ) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session key between a user and a smart…
read more here.
Keywords:
ilas iot;
improved lightweight;
scheme;
lightweight authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "ICT Express"
DOI: 10.1016/j.icte.2017.12.001
Abstract: Abstract In Vehicular Ad hoc Networks (VANETs), broadcasted beacon messages are critical as most safety applications rely on them. However, the design of a secure broadcast authentication faces many security and privacychallenges as vehicles are…
read more here.
Keywords:
lightweight authentication;
authentication;
privacy preserving;
bloom filters ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3070683
Abstract: The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and computing resource application efficiency of UAV a hot topic in the security field of the Internet of Things. In this paper, an…
read more here.
Keywords:
resource;
authentication protocol;
authentication;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3076692
Abstract: The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones’ navigation services. The main entities in IoD are drones,…
read more here.
Keywords:
authentication protocol;
protocol securing;
authentication;
protocol ... See more keywords
Photo by noaa from unsplash
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2017.2737630
Abstract: In the emerging industrial Internet of Things (IIoT) era, machine-to-machine (M2M) communication technology is considered as a key underlying technology for building IIoT environments, where devices (e.g., sensors, actuators, and gateways) are enabled to exchange…
read more here.
Keywords:
m2m;
m2m communications;
environment;
mechanism ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3138989
Abstract: Wireless body area networks (WBANs) technology nowadays has become a promising networking paradigm in the Internet of Things (IoT) as it can provide people with high quality of life and high level of medical service.…
read more here.
Keywords:
authentication;
mobile edge;
secure lightweight;
lightweight authentication ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3221943
Abstract: The existing identity security schemes (e.g., based on bilinear pairing) have high computational complexity and large bytes of variables, which results in high computation and communication costs. It is difficult to apply the schemes to…
read more here.
Keywords:
authentication;
authentication scheme;
lightweight authentication;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Wireless Communications"
DOI: 10.1109/mwc.002.2100594
Abstract: Representing a new stage in the industrial value chain, Industry 4.0 paves the way to the future eco-systems of industrial innovation, where cyber-physical systems (e.g., smart machines) form its basis by bridging the physical and…
read more here.
Keywords:
authentication;
uav networks;
blockchain based;
lightweight authentication ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2022.3148825
Abstract: As embedded integrated electronic systems (EIESs) become more pervasive (including in mission-critical applications), the need to ensure the security of data exchange in such a system against various malicious activities becomes more pronounced. However, designing…
read more here.
Keywords:
electronic systems;
lightweight authentication;
embedded integrated;
integrated electronic ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"
DOI: 10.1109/tsmc.2019.2957175
Abstract: Until now, the pseudonym ID and one-time hash chain as the key technologies solve anonymous and forward secrecy properties, respectively, in lightweight authentication protocols for wireless sensor networks (WSNs) environment. However, both techniques have to…
read more here.
Keywords:
authentication scheme;
lightweight authentication;
authentication;
sensor networks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2017.2744182
Abstract: Authentication is an important issue in vehicular ad hoc network. However, existing studies have not addressed some issues like efficiency and anonymity. In this paper, we propose an anonymous and lightweight authentication based on smart…
read more here.
Keywords:
lightweight authentication;
authentication;
authentication secure;
anonymous lightweight ... See more keywords