Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems

W Liang, L **ao, K Zhang, M Tang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Blockchain technology is rapidly changing the transaction behavior and efficiency of
businesses in recent years. Data privacy and system reliability are critical issues that is …

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

C Lin, D He, X Huang, KKR Choo… - Journal of network and …, 2018 - Elsevier
To be prepared for the 'Industry 4.0'-era, we propose a hierarchical framework comprising
four tangible layers, which is designed to vertically integrate inter-organizational value …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

X Li, J Niu, S Kumari, F Wu, AK Sangaiah… - Journal of Network and …, 2018 - Elsevier
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta… - Computer Networks, 2017 - Elsevier
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu… - Future Generation …, 2018 - Elsevier
Abstract Wireless Sensor Network (WSN) is a very important part of Internet of Things (IoT),
especially in e-healthcare applications. Among them, wireless medical sensor networks …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

A mutual security authentication method for RFID-PUF circuit based on deep learning

W Liang, S **e, D Zhang, X Li, KC Li - ACM Transactions on Internet …, 2021 - dl.acm.org
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process
controls, thereby leveraging improvements in economic benefits, such as efficiency and …

A lightweight multi-layer authentication protocol for wireless body area networks

J Shen, S Chang, J Shen, Q Liu, X Sun - Future generation computer …, 2018 - Elsevier
Nowadays, the technology of Internet of Things (IoT) is getting more and more important
which brings a lot of convenience to people's life and city's development. As a key …

A robust and energy efficient authentication protocol for industrial internet of things

X Li, J Peng, J Niu, F Wu, J Liao… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for
various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) …