Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

A survey on internet of things: Applications, recent issues, attacks, and security mechanisms

G Uganya, Radhika, N Vijayaraj - Journal of Circuits, Systems and …, 2021 - World Scientific
The Internet of Things (IoT) is a series of recording devices, mechanical and automated
machines, documents, creatures, or individuals that have one of the user identifiers and the …

A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles

Z Xu, W Liang, KC Li, J Xu, H ** - Journal of Parallel and Distributed …, 2021 - Elsevier
A fundamental layer of smart cities, the Internet of Vehicles (IoV) can significantly improve
transportation efficiency, reduce energy consumption, and traffic accidents. However …

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

R Amin, N Kumar, GP Biswas, R Iqbal… - Future Generation …, 2018 - Elsevier
With the widespread popularity and usage of Internet-enabled devices, Internet of things has
become one of the most popular techniques of the modern era. However, data generated …

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta… - Computer Networks, 2017 - Elsevier
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

Lightweight IoT-based authentication scheme in cloud computing circumstance

L Zhou, X Li, KH Yeh, C Su, W Chiu - Future generation computer systems, 2019 - Elsevier
Recently, authentication technologies integrated with the Internet of Things (IoT) and cloud
computing have been promptly investigated for secure data retrieval and robust access …

Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures

D He, S Zeadally, N Kumar… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Rapid advances in wireless communication technologies have paved the way for a wide
range of mobile devices to become increasingly ubiquitous and popular. Mobile devices …

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring

R Ali, AK Pal, S Kumari, M Karuppiah… - Future Generation …, 2018 - Elsevier
Agriculture is the backbone of our economic system and plays an important role in the life of
an economy. It does not only provide raw material and food, but also provides large …

Efficient privacy-aware authentication scheme for mobile cloud computing services

D He, N Kumar, MK Khan, L Wang… - IEEE Systems …, 2016 - ieeexplore.ieee.org
With the exponential increase of the mobile devices and the fast development of cloud
computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …