You are currently on the new version of our website. Access the old version .

954 Results Found

  • Article
  • Open Access
14 Citations
4,464 Views
27 Pages

Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services. TMIS uses wearable devices with sensors to collect patients’ data and transmit the data to...

  • Article
  • Open Access
25 Citations
15,794 Views
25 Pages

Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC-based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vul...

  • Review
  • Open Access
36 Citations
8,235 Views
31 Pages

22 October 2018

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. R...

  • Review
  • Open Access
569 Views
39 Pages

24 October 2025

The Internet of Medical Things (IoMT) comprises the application of traditional Internet of Things (IoT) technologies in the healthcare domain. IoMT ensures seamless data-sharing among hospitals, patients, and healthcare service providers, thereby tra...

  • Article
  • Open Access
2 Citations
2,500 Views
10 Pages

Novel Authentication Protocols Based on Quadratic Diophantine Equations

  • Avinash Vijayarangan,
  • Veena Narayanan,
  • Vijayarangan Natarajan and
  • Srikanth Raghavendran

1 September 2022

The Diophantine equation is a strong research domain in number theory with extensive cryptography applications. The goal of this paper is to describe certain geometric properties of positive integral solutions of the quadratic Diophantine equation x1...

  • Article
  • Open Access
12 Citations
3,103 Views
23 Pages

25 May 2023

Satellite–ground integrated networks (SGIN) are in line with 6th generation wireless network technology (6G) requirements. However, security and privacy issues are challenging with heterogeneous networks. Specifically, although 5G authenticatio...

  • Article
  • Open Access
1 Citations
2,754 Views
27 Pages

During the last few years, smart mobile devices have constituted an indispensable part of our lives, being a main element for many daily activities. However, it is well known that several security and privacy concerns still occur, especially taking i...

  • Article
  • Open Access
11 Citations
6,430 Views
24 Pages

User Authentication and Authorization Framework in IoT Protocols

  • Ammar Mohammad,
  • Hasan Al-Refai and
  • Ali Ahmad Alawneh

27 September 2022

The Internet of Things (IoT) has become one of the most attractive domains nowadays. It works by creating a special network between physical devices such as vehicles, home equipment, and other items. In recent days, the common technologies of communi...

  • Article
  • Open Access
1 Citations
3,362 Views
35 Pages

15 December 2021

The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implant...

  • Article
  • Open Access
17 Citations
7,252 Views
25 Pages

Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access...

  • Review
  • Open Access
11 Citations
5,186 Views
29 Pages

20 February 2024

The spectrum of Internet of Things (IoT) applications is vast. It serves in various domains such as smart homes, intelligent buildings, health care, emergency response, and many more, reflecting the exponential market penetration of the IoT. Various...

  • Article
  • Open Access
6 Citations
2,835 Views
23 Pages

We address a class of authentication protocols called “HB” ones and the man-in-the-middle (MIM) attack, reported at the ASIACRYPT conference, called OOV-MIM (Ouafi-Overbeck-Vaudenay MIM). Analysis of the considered attack and its systemat...

  • Article
  • Open Access
11 Citations
4,024 Views
20 Pages

Using Adaptive Zero-Knowledge Authentication Protocol in VANET Automotive Network

  • Igor Anatolyevich Kalmykov,
  • Aleksandr Anatolyevich Olenev,
  • Natalia Igorevna Kalmykova and
  • Daniil Vyacheslavovich Dukhovnyj

31 December 2022

One of the most important components of intelligent transportation systems (ITS) is the automotive self-organizing VANET network (vehicular ad hoc network). Its nodes are vehicles with specialized onboard units (OBU) installed on them. Such a network...

  • Article
  • Open Access
3 Citations
3,905 Views
26 Pages

A Novel Protocol Using Captive Portals for FIDO2 Network Authentication

  • Martiño Rivera-Dourado,
  • Marcos Gestal,
  • Alejandro Pazos and
  • Jose Vázquez-Naya

24 April 2024

FIDO2 authentication is starting to be applied in numerous web authentication services, aiming to replace passwords and their known vulnerabilities. However, this new authentication method has not been integrated yet with network authentication syste...

  • Article
  • Open Access
12 Citations
2,823 Views
21 Pages

An Authentication Protocol for the Medical Internet of Things

  • Nagwa El-Meniawy,
  • Mohamed R. M. Rizk,
  • Magdy A. Ahmed and
  • Mohamed Saleh

20 July 2022

The progress in biomedical sensors, Internet of Things technologies, big data, cloud computing, and artificial intelligence is leading the development of e-health medical systems, offering a range of new and innovative services. One such service is r...

  • Article
  • Open Access
8 Citations
1,869 Views
16 Pages

5 July 2024

The rapid development of the Industrial Internet of Things (IIoT) and its application across various sectors has led to increased interconnectivity and data sharing between devices and sensors. While this has brought convenience to users, it has also...

  • Article
  • Open Access
53 Citations
12,969 Views
17 Pages

A Privacy-Preserving, Mutual PUF-Based Authentication Protocol

  • Wenjie Che,
  • Mitchell Martin,
  • Goutham Pocklassery,
  • Venkata K. Kajuluri,
  • Fareena Saqib and
  • Jim Plusquellic

This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HELP derives randomness from within-die path delay variations that occur along the paths within a hardware implementation of a cryptographic primitive, s...

  • Article
  • Open Access
6 Citations
3,003 Views
20 Pages

A Secure and Scalable Authentication and Communication Protocol for Smart Grids

  • Muhammad Asfand Hafeez,
  • Kazi Hassan Shakib and
  • Arslan Munir

The growing adoption of smart grid systems presents significant advancements in the efficiency of energy distribution, along with enhanced monitoring and control capabilities. However, the interconnected and distributed nature of these systems also i...

  • Article
  • Open Access
13 Citations
3,728 Views
40 Pages

The Internet of Things (IoT) has revolutionized connected devices, with applications in healthcare, data analytics, and smart cities. For time-sensitive applications, 5G wireless networks provide ultra-reliable low-latency communication (URLLC) and f...

  • Article
  • Open Access
21 Citations
5,743 Views
16 Pages

A Lightweight Authentication Protocol for UAVs Based on ECC Scheme

  • Shuo Zhang,
  • Yaping Liu,
  • Zhiyu Han and
  • Zhikai Yang

9 May 2023

With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention. Due to open-access communication environments, UAVs may raise security concerns, including authe...

  • Article
  • Open Access
2 Citations
2,063 Views
20 Pages

2 November 2022

People can access and obtain services from smart home devices conveniently through fog-enabled smart home environments. The security and privacy-preserving authentication protocol play an important role. However, many proposed protocols have one or m...

  • Article
  • Open Access
25 Citations
4,464 Views
12 Pages

SKINNY-Based RFID Lightweight Authentication Protocol

  • Liang Xiao,
  • He Xu,
  • Feng Zhu,
  • Ruchuan Wang and
  • Peng Li

2 March 2020

With the rapid development of the Internet of Things and the popularization of 5G communication technology, the security of resource-constrained IoT devices such as Radio Frequency Identification (RFID)-based applications have received extensive atte...

  • Article
  • Open Access
20 Citations
6,151 Views
24 Pages

28 March 2018

A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server. The authentication server is responsible for authenticat...

  • Article
  • Open Access
21 Citations
4,620 Views
27 Pages

Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards

  • Anuj Kumar Singh,
  • Arun Solanki,
  • Anand Nayyar and
  • Basit Qureshi

23 November 2020

In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective des...

  • Article
  • Open Access
3 Citations
2,087 Views
24 Pages

28 March 2025

Cross-domain authentication of drones has played an important role in emergency rescue, collaborative missions, and so on. However, the existing cross-domain authentication protocols for drones may cause privacy leakages and stolen-verifier attacks d...

  • Article
  • Open Access
2,948 Views
12 Pages

Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems

  • Emmanuel Ahene,
  • Mark Ofori-Oduro,
  • Frimpong Twum,
  • Joojo Walker and
  • Yaw Marfo Missah

9 December 2021

Chaos theory and its extension into cryptography has generated significant applications in industrial mixing, pulse width modulation and in electric compaction. Likewise, it has merited applications in authentication mechanisms for wireless power tra...

  • Article
  • Open Access
17 Citations
4,942 Views
19 Pages

9 October 2020

The standard protocol of near field communication (NFC) has concentrated primarily on the speed of communication while ignoring security properties. Message between an NFC-enabled smartphone and a point of sale are exchanged over the air (OTA), which...

  • Article
  • Open Access
212 Citations
10,116 Views
26 Pages

Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

  • Younsung Choi,
  • Donghoon Lee,
  • Jiye Kim,
  • Jaewook Jung,
  • Junghyun Nam and
  • Dongho Won

10 June 2014

Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the...

  • Article
  • Open Access
26 Citations
6,296 Views
25 Pages

3 January 2022

Many group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pai...

  • Article
  • Open Access
6 Citations
1,603 Views
15 Pages

21 June 2024

A secure and effective authentication and communication scheme between users and underwater sensors plays an important role in improving the detection and utilization of marine resources in underwater acoustic networks (UANs). However, due to the ene...

  • Article
  • Open Access
9 Citations
2,786 Views
17 Pages

9 September 2023

In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless sensor network. In order to prevent unwarranted users from accessing the sensor network to obtain patients’ d...

  • Article
  • Open Access
11 Citations
2,181 Views
16 Pages

24 March 2023

Wireless sensor networks are a promising application of the Internet of Things in the sustainable development of smart cities, and have been afforded significant attention since first being proposed. Authentication protocols aim to protect the securi...

  • Article
  • Open Access
6 Citations
3,736 Views
19 Pages

Autonomous Mutual Authentication Protocol in the Edge Networks

  • Ruey-Kai Sheu,
  • Mayuresh Sunil Pardeshi and
  • Lun-Chi Chen

8 October 2022

A distinct security protocol is necessary for the exponential growth in intelligent edge devices. In particular, the autonomous devices need to address significant security concern to function smoothly in the high market demand. Nevertheless, exponen...

  • Article
  • Open Access
2,593 Views
18 Pages

28 July 2021

In this paper, we propose an enhanced version of the Authentication with Built-in Camera (ABC) protocol by employing a deep learning solution based on built-in motion sensors. The standard ABC protocol identifies mobile devices based on the photo-res...

  • Article
  • Open Access
32 Citations
3,397 Views
15 Pages

11 April 2020

Efficient authentication and key agreement protocols between two entities are required in many application areas. In particular, for client–server type of architectures, the client is mostly represented by a constrained device and thus highly e...

  • Article
  • Open Access
63 Citations
6,544 Views
16 Pages

19 May 2016

Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to r...

  • Article
  • Open Access
1 Citations
1,363 Views
12 Pages

26 August 2024

In gas sensor networks, users can access the data collected by the sensor nodes, but there is a risk of data leakage during transmission. This paper proposes a lightweight bidirectional authentication protocol based on gas sensor physically unclonabl...

  • Article
  • Open Access
8 Citations
2,583 Views
18 Pages

Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications

  • Kevin Andrae Delgado-Vargas,
  • Gina Gallegos-Garcia and
  • Ponciano Jorge Escamilla-Ambrosio

28 January 2023

Nowadays, technological advances provide people with more facilities and luxuries in life. Medicine is no exception; for example, different wireless sensors can be used to monitor patients’ state of health. These sensors are used in the so-call...

  • Article
  • Open Access
4 Citations
2,440 Views
18 Pages

19 April 2023

The Internet of Things (IoT) consists of a range of devices that communicate with other devices that are surrounding them. Secure communications between IoT devices have been an essential requirement. However, most existing authentication protocols f...

  • Article
  • Open Access
23 Citations
3,160 Views
22 Pages

28 August 2021

Mobile healthcare service has become increasingly popular thanks to the significant advances in the wireless body area networks (WBANs). It helps medical professionals to collect patient’s healthcare data remotely and provides remote medical diagnosi...

  • Article
  • Open Access
8 Citations
3,366 Views
16 Pages

A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System

  • Chen Chen,
  • Hua Guo,
  • Yapeng Wu,
  • Bowen Shen,
  • Mingyang Ding and
  • Jianwei Liu

14 April 2023

The IoT-enabled Smart Grid uses IoT smart devices to collect the private electricity data of consumers and send it to service providers over the public network, which leads to some new security problems. To ensure the communication security in a smar...

  • Article
  • Open Access
14 Citations
5,463 Views
13 Pages

11 April 2018

This paper proposes an improved two-way security authentication protocol to improve the security level of Radio Frequency Identification (RFID) system. In the proposed protocol, tags calculate hash value, which is divided into two parts. The left hal...

  • Article
  • Open Access
9 Citations
3,055 Views
11 Pages

27 March 2023

The IoT is a specific type of network with its own communication challenges. There are a multitude of low-power devices monitoring the environment. Thus, the need for authentication may be addressed by many available sensors but should be performed o...

  • Article
  • Open Access
94 Citations
8,235 Views
21 Pages

Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography

  • Khwaja Mansoor,
  • Anwar Ghani,
  • Shehzad Ashraf Chaudhry,
  • Shahaboddin Shamshirband,
  • Shahbaz Ahmed Khan Ghayyur and
  • Amir Mosavi

1 November 2019

Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID sy...

  • Article
  • Open Access
25 Citations
3,743 Views
18 Pages

A Lightweight and Practical Anonymous Authentication Protocol Based on Bit-Self-Test PUF

  • Yang An,
  • Yuejiao Zhang,
  • Wenjun Cao,
  • Zhiyan Tong and
  • Zhangqing He

Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol design because it can ensure a tamper-evident feature. In many PUF-based protocol schemes, helper data algorithms (HDA) or fuzzy extractors (FE) are use...

  • Article
  • Open Access
6 Citations
3,092 Views
17 Pages

17 November 2022

Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. Zerrouki et al.’s PUF protocol is interesting because it does not requi...

  • Article
  • Open Access
3 Citations
3,161 Views
17 Pages

16 December 2019

Wearable and portable medical devices are one of the fastest growing sectors in the Internet of Things (IoT) market. However, medical services specialize in the processing of personal health data, which carries issues that are not faced by other indu...

  • Article
  • Open Access
33 Citations
7,087 Views
21 Pages

MAKE-IT—A Lightweight Mutual Authentication and Key Exchange Protocol for Industrial Internet of Things

  • Karanjeet Choudhary,
  • Gurjot Singh Gaba,
  • Ismail Butun and
  • Pardeep Kumar

10 September 2020

Continuous development of the Industrial Internet of Things (IIoT) has opened up enormous opportunities for the engineers to enhance the efficiency of the machines. Despite the development, many industry administrators still fear to use Internet for...

  • Article
  • Open Access
10 Citations
4,054 Views
11 Pages

FPGA Implementation of Mutual Authentication Protocol for Medication Security System

  • Wei-Chen Lin,
  • Po-Kai Huang,
  • Chung-Long Pan and
  • Yu-Jung Huang

Medication safety administration is a complicated process involving the information of patients, drugs, and data storage. The sensitive data transmitted through wireless sensor networks (WSNs) from Internet of things (IoT) over an insecure channel is...

  • Article
  • Open Access
10 Citations
2,670 Views
23 Pages

27 November 2022

Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Internet of Things (IoT), which consists of sensors, actuators at the edge, and servers. In order to solve the security and availability problems regarding c...

of 20