A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022‏ - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review

J Asim, AS Khan, RM Saqib, J Abdullah, Z Ahmad… - Applied Sciences, 2022‏ - mdpi.com
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …

A secure blockchain-assisted authentication framework for electronic health records

V Kumar, R Ali, PK Sharma - International Journal of Information …, 2024‏ - Springer
The evolution of internet technology has significantly broadened the accessibility of E-
healthcare services, with Electronic Healthcare Records (EHR) holding a pivotal role in this …

Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network

AS Khan, MIB Yahya, KB Zen, JB Abdullah… - IEEE …, 2023‏ - ieeexplore.ieee.org
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …

A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs

R Kumar, S Singh, PK Singh - Computers and Electrical Engineering, 2023‏ - Elsevier
In recent years, network-enabled physical devices have emerged as a solution to many
problems, such as those involved in transmitting data from the physical world …

MS‐ADS: multistage spectrogram image‐based anomaly detection system for IoT security

Z Ahmad, AS Khan, K Zen… - Transactions on Emerging …, 2023‏ - Wiley Online Library
The innovative computing idea of Internet‐of‐Things (IoT) architecture has gained
tremendous popularity over the last decade, resulting in an exponential increase in the …

Secured authentication of RFID devices using lightweight block ciphers on FPGA platforms

P Anusha, PR Rao, NP Rai - IEEE Access, 2023‏ - ieeexplore.ieee.org
Near Field Communication (NFC) has emerged as a pivotal wireless technology for short-
range data exchange between devices, including smartphones and wearables. Leveraging …

[HTML][HTML] An Enhanced Multi-Factor Authentication and Key Agreement Protocol in Industrial Internet of Things

F Tabassum, M Rahaman - 2024‏ - insights2techinfo.com
The article presents an enhanced Multi-Factor Authentication (MFA) and Key Agreement
protocol for the Industrial Internet of Things (IIoT). It addresses the security challenges in IIoT …

Edge-enabled zero trust architecture for ICPS with spatial and temporal granularity

W Lei, Z Pang, H Wen, W Hou… - 2023 IEEE 6th …, 2023‏ - ieeexplore.ieee.org
Motivated by the rapid advancement of industrial cyber-physical systems (ICPS) and rising
voices in favor of zero trust (ZT) security, in this paper, we present an edge-enabled zero …

TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network

N Nisa, AS Khan, Z Ahmad… - International Journal of …, 2024‏ - Wiley Online Library
Software‐defined networking (SDN) has received considerable attention and adoption
owing to its inherent advantages, such as enhanced scalability, increased adaptability, and …