Acoustic-based sensing and applications: A survey

Y Bai, L Lu, J Cheng, J Liu, Y Chen, J Yu - Computer Networks, 2020 - Elsevier
With advancements of wireless and sensing technologies, recent studies have
demonstrated technical feasibility and effectiveness of using acoustic signals for sensing. In …

Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions

P Gope, J Lee, TQS Quek - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …

A review and analysis of secure and lightweight ECC‐based RFID authentication protocol for Internet of Vehicles

S Kumar, H Banka, B Kaushik… - Transactions on …, 2021 - Wiley Online Library
Radio‐frequency identification (RFID) technology has proliferated over the last few years
and being deployed as identification technology in numerous domains like intelligent …

A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

YP Liao, CM Hsiao - Ad hoc networks, 2014 - Elsevier
Abstract IoT (Internet of Things) is a type of network where ICT (Information and
Communication Technology) links any physical objects to the internet to perform information …

SAPWSN: A secure authentication protocol for wireless sensor networks

FG Darbandeh, M Safkhani - Computer Networks, 2023 - Elsevier
With the advancement of RFID systems, there is a need for secure RFID authentication that
can provide security against a variety of attacks, so designing a perfectly safe protocol has …

An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks

Q Jiang, J Ma, G Li, L Yang - Wireless personal communications, 2013 - Springer
Global mobility network (GLOMONET) provides global roaming service to ensure ubiquitous
connectivity for users traveling from one network to another. It is very crucial not only to …

A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem

Z Zhao - Journal of medical systems, 2014 - Springer
With the fast advancement of the wireless communication technology and the widespread
use of medical systems, the radio frequency identification (RFID) technology has been …

Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol

D He, N Kumar, N Chilamkurti, JH Lee - Journal of medical systems, 2014 - Springer
The radio frequency identification (RFID) technology has been widely adopted and being
deployed as a dominant identification technology in a health care domain such as medical …

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

JS Chou - The Journal of supercomputing, 2014 - Springer
Radio frequency identification (RFID) tags have been widely deployed in many applications,
such as supply chain management, inventory control, and traffic card payment. However …

Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things

TF Lee, WY Chen - Journal of Information Security and Applications, 2021 - Elsevier
Abstract The Internet of Medical Things (IoMT) is a network of connections between a
medical information system and medical equipment. Fog computing for IoMT is a model for …