Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems
Blockchain technology is rapidly changing the transaction behavior and efficiency of
businesses in recent years. Data privacy and system reliability are critical issues that is …
businesses in recent years. Data privacy and system reliability are critical issues that is …
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
To be prepared for the 'Industry 4.0'-era, we propose a hierarchical framework comprising
four tangible layers, which is designed to vertically integrate inter-organizational value …
four tangible layers, which is designed to vertically integrate inter-organizational value …
Two birds with one stone: Two-factor authentication with security beyond conventional bound
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …
authentication has been a subject of intensive research in the past two decades, and …
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …
and control across heterogeneous network a reality, and has good prospects in industrial …
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …
information about the physical conditions of patients. Due to the openness and mobility of …
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
Abstract Wireless Sensor Network (WSN) is a very important part of Internet of Things (IoT),
especially in e-healthcare applications. Among them, wireless medical sensor networks …
especially in e-healthcare applications. Among them, wireless medical sensor networks …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
A mutual security authentication method for RFID-PUF circuit based on deep learning
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process
controls, thereby leveraging improvements in economic benefits, such as efficiency and …
controls, thereby leveraging improvements in economic benefits, such as efficiency and …
A lightweight multi-layer authentication protocol for wireless body area networks
Nowadays, the technology of Internet of Things (IoT) is getting more and more important
which brings a lot of convenience to people's life and city's development. As a key …
which brings a lot of convenience to people's life and city's development. As a key …
A robust and energy efficient authentication protocol for industrial internet of things
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for
various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) …
various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) …