A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …
Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …
A secure blockchain-assisted authentication framework for electronic health records
The evolution of internet technology has significantly broadened the accessibility of E-
healthcare services, with Electronic Healthcare Records (EHR) holding a pivotal role in this …
healthcare services, with Electronic Healthcare Records (EHR) holding a pivotal role in this …
Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …
A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs
In recent years, network-enabled physical devices have emerged as a solution to many
problems, such as those involved in transmitting data from the physical world …
problems, such as those involved in transmitting data from the physical world …
MS‐ADS: multistage spectrogram image‐based anomaly detection system for IoT security
The innovative computing idea of Internet‐of‐Things (IoT) architecture has gained
tremendous popularity over the last decade, resulting in an exponential increase in the …
tremendous popularity over the last decade, resulting in an exponential increase in the …
Secured authentication of RFID devices using lightweight block ciphers on FPGA platforms
Near Field Communication (NFC) has emerged as a pivotal wireless technology for short-
range data exchange between devices, including smartphones and wearables. Leveraging …
range data exchange between devices, including smartphones and wearables. Leveraging …
[HTML][HTML] An Enhanced Multi-Factor Authentication and Key Agreement Protocol in Industrial Internet of Things
F Tabassum, M Rahaman - 2024 - insights2techinfo.com
The article presents an enhanced Multi-Factor Authentication (MFA) and Key Agreement
protocol for the Industrial Internet of Things (IIoT). It addresses the security challenges in IIoT …
protocol for the Industrial Internet of Things (IIoT). It addresses the security challenges in IIoT …
Edge-enabled zero trust architecture for ICPS with spatial and temporal granularity
Motivated by the rapid advancement of industrial cyber-physical systems (ICPS) and rising
voices in favor of zero trust (ZT) security, in this paper, we present an edge-enabled zero …
voices in favor of zero trust (ZT) security, in this paper, we present an edge-enabled zero …
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
Software‐defined networking (SDN) has received considerable attention and adoption
owing to its inherent advantages, such as enhanced scalability, increased adaptability, and …
owing to its inherent advantages, such as enhanced scalability, increased adaptability, and …