Skip to Content
You are currently on the new version of our website. Access the old version .

2,423 Results Found

  • Review
  • Open Access
9 Citations
13,802 Views
53 Pages

A Review on Secure Authentication Mechanisms for Mobile Security

  • Syed Shabih Ul Hasan,
  • Anwar Ghani,
  • Ali Daud,
  • Habib Akbar and
  • Muhammad Faizan Khan

24 January 2025

Cybersecurity, complimenting authentication, has become the backbone of the Internet of Things. In the authentication process, the word authentication is of the utmost importance, as it is the door through which both Mr. Right Guy and Mr. Wrong Guy c...

  • Article
  • Open Access
4 Citations
3,626 Views
24 Pages

Secure Authentication in the Smart Grid

  • Mehdi Hosseinzadeh,
  • Rizwan Ali Naqvi,
  • Masoumeh Safkhani,
  • Lilia Tightiz and
  • Raja Majid Mehmood

29 December 2022

Authenticated key agreement is a process in which protocol participants communicate over a public channel to share a secret session key, which is then used to encrypt data transferred in subsequent communications. LLAKEP, an authenticated key agreeme...

  • Article
  • Open Access
74 Citations
6,325 Views
23 Pages

Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications

  • SungJin Yu,
  • JoonYoung Lee,
  • KyungKeun Lee,
  • KiSung Park and
  • YoungHo Park

21 September 2018

With wireless sensor networks (WSNs), a driver can access various useful information for convenient driving, such as traffic congestion, emergence, vehicle accidents, and speed. However, a driver and traffic manager can be vulnerable to various attac...

  • Article
  • Open Access
3 Citations
1,149 Views
20 Pages

The rise of telehealth in smart cities has introduced both opportunities and challenges, particularly in securing sensitive patient data and ensuring reliable authentication. This paper presents a chaos-based dynamic authentication scheme designed to...

  • Article
  • Open Access
12 Citations
3,387 Views
18 Pages

The metaverse, which amalgamates physical and virtual realms for diverse social activities, has been the focus of extensive application development by organizations, research institutes, and companies. However, these applications are often isolated,...

  • Article
  • Open Access
26 Citations
6,139 Views
16 Pages

26 June 2014

Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing secu...

  • Article
  • Open Access
5 Citations
2,343 Views
18 Pages

13 February 2025

In recent years, with the widespread application of UAV swarm, the security problems faced have been gradually discovered, such as the lack of reliable identity authentication, which makes UAVs vulnerable to invasion. To solve these security problems...

  • Article
  • Open Access
6 Citations
2,770 Views
25 Pages

A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment

  • Ali Peivandizadeh,
  • Haitham Y. Adarbah,
  • Behzad Molavi,
  • Amirhossein Mohajerzadeh and
  • Ali H. Al-Badi

30 September 2024

In today’s advanced network and digital age, the Internet of Things network is experiencing a significant growing trend and, due to its wide range of services and network coverage, has been able to take a special place in today’s technolo...

  • Feature Paper
  • Article
  • Open Access
5 Citations
8,392 Views
29 Pages

We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF), respectively, from an information theoretical point of view. We analyse different definitions of achievability for the authe...

  • Article
  • Open Access
13 Citations
6,089 Views
24 Pages

Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE

  • Patrícia R. Sousa,
  • Luís Magalhães,
  • João S. Resende,
  • Rolando Martins and
  • Luís Antunes

2 September 2021

The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate a...

  • Article
  • Open Access
1 Citations
1,813 Views
16 Pages

In the Internet of Vehicles (IoV) environments, vehicles and roadside units (RSUs) communicate predominantly through public channels. These vehicles and RSUs exchange various data, such as traffic density, location, speed, etc. Therefore, secure and...

  • Article
  • Open Access
13 Citations
4,585 Views
34 Pages

A Survey on Quantitative Risk Estimation Approaches for Secure and Usable User Authentication on Smartphones

  • Maria Papaioannou,
  • Filippos Pelekoudas-Oikonomou,
  • Georgios Mantas,
  • Emmanouil Serrelis,
  • Jonathan Rodriguez and
  • Maria-Anna Fengou

9 March 2023

Mobile user authentication acts as the first line of defense, establishing confidence in the claimed identity of a mobile user, which it typically does as a precondition to allowing access to resources in a mobile device. NIST states that password sc...

  • Article
  • Open Access
54 Citations
7,485 Views
22 Pages

A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

  • Junghyun Nam,
  • Moonseong Kim,
  • Juryon Paik,
  • Youngsook Lee and
  • Dongho Won

6 November 2014

A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a...

  • Article
  • Open Access
7 Citations
4,411 Views
20 Pages

3 February 2024

An Internet of Things (IoT) system for managing and coordinating unmanned aerial vehicles (UAVs) has revolutionized the industrial sector. The largest issue with the design of the Internet of UAVs (IoUAV) is security. Conspicuously, the novel contrib...

  • Article
  • Open Access
28 Citations
5,651 Views
23 Pages

An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP

  • Bin Ma,
  • Shichun Yang,
  • Zheng Zuo,
  • Bosong Zou,
  • Yaoguang Cao,
  • Xiaoyu Yan,
  • Sida Zhou and
  • Jichong Li

14 January 2022

The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats. Using secure protocols is an important approach to protect ICVs from hacker a...

  • Article
  • Open Access
4 Citations
2,569 Views
18 Pages

23 April 2022

The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing and monitoring various types of data. These 5G based IoT environments collect various data in real-time using micro-sensors as IoT things devices and...

  • Article
  • Open Access
4 Citations
5,358 Views
15 Pages

Secure Path: Block-Chaining IoT Information for Continuous Authentication in Smart Spaces

  • Lorenzo Bracciale,
  • Pierpaolo Loreti,
  • Claudio Pisa and
  • Alex Shahidi

18 May 2021

The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunist...

  • Article
  • Open Access
6 Citations
3,358 Views
16 Pages

Toward Designing a Secure Authentication Protocol for IoT Environments

  • Mehdi Hosseinzadeh,
  • Mazhar Hussain Malik,
  • Masoumeh Safkhani,
  • Nasour Bagheri,
  • Quynh Hoang Le,
  • Lilia Tightiz and
  • Amir H. Mosavi

29 March 2023

Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the desig...

  • Article
  • Open Access
12 Citations
4,994 Views
16 Pages

7 October 2022

The development of 5G networks has rapidly increased the use of Industrial Internet of Things (IIoT) devices for control, monitoring, and processing purposes. Biometric-based user authentication can prevent unauthorized access to IIoT devices, thereb...

  • Article
  • Open Access
10 Citations
1,576 Views
31 Pages

A Secure and Lightweight Group Mobility Authentication Scheme for 6LoWPAN Networks

  • Fatma Foad Ashrif,
  • Elankovan A. Sundararajan,
  • Mohammad Kamrul Hasan and
  • Rami Ahmad

27 February 2025

The integration of Internet Protocol version 6 over Low-Power Wireless Personal Area Networks (6LoWPANs) provided IP technologies within wireless sensor networks that dramatically increased the Internet of Things (IoT). Therefore, to facilitate effic...

  • Article
  • Open Access
79 Citations
12,665 Views
25 Pages

Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks

  • Thaier Hayajneh,
  • Bassam J Mohd,
  • Muhammad Imran,
  • Ghada Almashaqbeh and
  • Athanasios V. Vasilakos

24 March 2016

There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting th...

  • Article
  • Open Access
23 Citations
3,701 Views
20 Pages

Secure D2D Group Authentication Employing Smartphone Sensor Behavior Analysis

  • Haowen Tan,
  • Yuanzhao Song,
  • Shichang Xuan,
  • Sungbum Pan and
  • Ilyong Chung

1 August 2019

Nowadays, with rapid advancement of both the upcoming 5G architecture construction and emerging Internet of Things (IoT) scenarios, Device-to-Device (D2D) communication provides a novel paradigm for mobile networking. By facilitating continuous and h...

  • Feature Paper
  • Article
  • Open Access
112 Views
28 Pages

12 February 2026

Flying Ad Hoc Networks (FANETs) formed by cooperative Unmanned Aerial Vehicles (UAVs) require formally proven secure and resource-efficient authentication because open wireless channels allow active adversaries to inject commands, replay traffic, and...

  • Article
  • Open Access
44 Citations
7,022 Views
39 Pages

Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain

  • Manik Gupta,
  • Rakesh Kumar,
  • Shashi Shekhar,
  • Bhisham Sharma,
  • Ram Bahadur Patel,
  • Shaily Jain,
  • Imed Ben Dhaou and
  • Celestine Iwendi

7 July 2022

The Internet of Vehicles (IoV) is a new paradigm for vehicular networks. Using diverse access methods, IoV enables vehicles to connect with their surroundings. However, without data security, IoV settings might be hazardous. Because of the IoV’...

  • Article
  • Open Access
15 Citations
8,154 Views
20 Pages

The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly susceptible to piracy. These pirated edge devices pose a serious threat to security, as an adversary can get access to the private network through these non-a...

  • Article
  • Open Access
37 Citations
3,669 Views
21 Pages

Secure and Lightweight Authentication Protocol for Privacy Preserving Communications in Smart City Applications

  • Sunil Gupta,
  • Fares Alharbi,
  • Reem Alshahrani,
  • Pradeep Kumar Arya,
  • Sonali Vyas,
  • Dalia H. Elkamchouchi and
  • Ben Othman Soufiene

17 March 2023

A smart city is a concept that leverages technology to improve the quality of life for citizens, enhance sustainability, and streamline urban services. The goal of a smart city is to use data and technology to manage resources and assets efficiently,...

  • Article
  • Open Access
54 Citations
5,817 Views
20 Pages

19 August 2019

With the development of cloud computing and communication technology, users can access the internet of things (IoT) services provided in various environments, including smart home, smart factory, and smart healthcare. However, a user is insecure vari...

  • Article
  • Open Access
7 Citations
1,530 Views
22 Pages

5 November 2024

Authentication is considered one of the most critical technologies for the next generation of the Internet of Medical Things (IoMT) due to its ability to significantly improve the security of sensors. However, higher frequency cyber-attacks and more...

  • Article
  • Open Access
9 Citations
2,326 Views
23 Pages

15 February 2024

With the increasing demand for a digital world, the Industrial Internet of Things (IIoT) is growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the IIoT assumes a vital role. It encompasses many devices such as...

  • Article
  • Open Access
860 Views
29 Pages

3 July 2025

The Internet of Drones (IoD) is rapidly expanding into sensitive applications, necessitating robust and efficient authentication. Traditional methods struggle against prevalent attacks, especially considering the unique vulnerabilities of the IoD, su...

  • Article
  • Open Access
4 Citations
1,397 Views
19 Pages

31 October 2024

Wireless Sensor Networks (WSNs) are rapidly being integrated into various fields, significantly impacting and facilitating many aspects of human life. However, the increasingly prominent security issues associated with WSNs have become a significant...

  • Article
  • Open Access
523 Views
13 Pages

3 January 2026

The Internet of Medical Things represents a pivotal application of Internet of Things technology in Healthcare 4.0, offering substantial practical benefits in enhancing medical quality, reducing costs, and minimizing errors. In history, researchers h...

  • Article
  • Open Access
5 Citations
2,491 Views
23 Pages

Machine Learning-Enhanced Attribute-Based Authentication for Secure IoT Access Control

  • Jibran Saleem,
  • Umar Raza,
  • Mohammad Hammoudeh and
  • William Holderbaum

28 April 2025

The rapid growth of Internet of Things (IoT) devices across industrial and critical sectors requires robust and efficient authentication mechanisms. Traditional authentication systems struggle to balance security, privacy and computational efficiency...

  • Article
  • Open Access
1 Citations
3,760 Views
19 Pages

A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data

  • Abdulrahman Hussian,
  • Foud Murshed,
  • Mohammed Nasser Alandoli and
  • Ghalib Aljafari

Despite significant advancements in fingerprint-based authentication, existing models still suffer from challenges such as high false acceptance and rejection rates, computational inefficiency, and vulnerability to spoofing attacks. Addressing these...

  • Article
  • Open Access
698 Views
26 Pages

A Secure Message Authentication Method in the Internet of Vehicles Using Cloud-Edge-Client Architecture

  • Yuan Zhang,
  • Zihan Zhou,
  • Chang Jiang,
  • Wei Huang,
  • Yifei Zheng,
  • Tianli Tang and
  • Khadka Anish

29 October 2025

With the rapid deployment of intelligent transportation systems (ITS), the Internet of Vehicles (IoV) has become an increasingly vital component in the development of smart cities. However, the openness of IoV also gives rise to critical issues such...

  • Article
  • Open Access
2 Citations
2,973 Views
33 Pages

As more Internet of Things (IoT) devices are being used, more sensitive data and services are also being hosted by, or accessed via, IoT devices. This leads to a need for a stronger authentication solution for the IoT context, and a stronger authenti...

  • Article
  • Open Access
13 Citations
4,055 Views
20 Pages

18 May 2021

Secure authentication is an essential mechanism required by the vast majority of computer systems and various applications in order to establish user identity. Credentials such as passwords and biometric data should be protected against theft, as use...

  • Article
  • Open Access
2,709 Views
20 Pages

28 August 2025

This study introduces a promising authentication framework utilizing brain–computer interface (BCI) technology to enhance both security protocols and user experience. A key strength of this approach lies in its reliance on objective, physiologi...

  • Article
  • Open Access
7 Citations
3,275 Views
17 Pages

With the expansion of the Industrial Internet of Things (IIoT), real-time data collected by smart sensors deployed in factories are shared over open channels , which may cause unauthorized access of transmitted messages by adversaries, thus causing t...

  • Article
  • Open Access
5 Citations
1,952 Views
20 Pages

Augmented reality (AR) is a virtual technology that integrates virtual information and objects into real environments, offering unprecedented possibilities in such fields such as architecture, education, and healthcare. Real-time communication and se...

  • Article
  • Open Access
14 Citations
2,989 Views
25 Pages

A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks

  • Shaoqiang Wang,
  • Ziyao Fan,
  • Yu Su,
  • Baosen Zheng,
  • Zhaoyuan Liu and
  • Yinfei Dai

In the contemporary era, Vehicular Ad Hoc Networks (VANETs) have emerged as a vital technology in intelligent transportation systems, substantially enhancing the overall travel experience by providing advanced services to vehicles while ensuring driv...

  • Article
  • Open Access
31 Citations
5,609 Views
16 Pages

10 January 2020

The integration of Internet of things (IoT) and cloud computing technology has made our life more convenient in recent years. Cooperating with cloud computing, Internet of things can provide more efficient and practical services. People can accept Io...

  • Article
  • Open Access
8 Citations
1,908 Views
16 Pages

5 July 2024

The rapid development of the Industrial Internet of Things (IIoT) and its application across various sectors has led to increased interconnectivity and data sharing between devices and sensors. While this has brought convenience to users, it has also...

  • Article
  • Open Access
11 Citations
2,214 Views
16 Pages

24 March 2023

Wireless sensor networks are a promising application of the Internet of Things in the sustainable development of smart cities, and have been afforded significant attention since first being proposed. Authentication protocols aim to protect the securi...

  • Article
  • Open Access
273 Views
28 Pages

Wireless medical sensor networks (WMSNs) have evolved alongside the development of communication systems, and the integration of cloud computing has enabled scalable and efficient medical data management. However, since the messages in WMSNs are tran...

  • Article
  • Open Access
1 Citations
1,269 Views
28 Pages

This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). Unlike conventional me...

  • Article
  • Open Access
5 Citations
2,717 Views
20 Pages

In quantum secure multi-party summation protocols, some attackers can impersonate legitimate participants in the summation process, and easily steal the summation results from the participants. This is often overlooked for existing secure multi-party...

  • Article
  • Open Access
26 Citations
5,610 Views
26 Pages

The use of Electric Vehicles (EVs) is almost inevitable in the near future for the sake of the environment and our plant’s long-term sustainability. The availability of an Electric-Vehicle-Charging Station (EVCS) is the key challenge that owner...

  • Article
  • Open Access
4 Citations
3,815 Views
29 Pages

The design and implementation of two-factor schemes designed for roaming mobile users for global mobility networks in smart cities requires attention to protect the scheme from various security attacks, such as the replay attack, impersonation attack...

  • Article
  • Open Access
8 Citations
3,562 Views
28 Pages

STT-DPSA: Digital PUF-Based Secure Authentication Using STT-MRAM for the Internet of Things

  • Wei-Chen Chien,
  • Yu-Chian Chang,
  • Yao-Tung Tsou,
  • Sy-Yen Kuo and
  • Ching-Ray Chang

Physical unclonable function (PUF), a hardware-efficient approach, has drawn a lot of attention in the security research community for exploiting the inevitable manufacturing variability of integrated circuits (IC) as the unique fingerprint of each I...

of 49