A survey on methods and challenges in EEG based authentication

AJ Bidgoly, HJ Bidgoly, Z Arezoumand - Computers & Security, 2020 - Elsevier
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …

A blockchain-enabled privacy-preserving authentication management protocol for Internet of Medical Things

J Miao, Z Wang, Z Wu, X Ning, P Tiwari - Expert Systems with Applications, 2024 - Elsevier
Over the last decade, with the increasing popularity and usage of the internet of things
worldwide, Internet of Medical Things (IoMT) has emerged as a key technology of the …

Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

Secure and lightweight user authentication scheme for cloud-assisted Internet of Things

C Wang, D Wang, Y Duan, X Tao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud-assisted Internet of Things (IoT) overcomes the resource-constrained nature of the
traditional IoT and is develo** rapidly in such fields as smart grids and intelligent …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi… - Computer Networks, 2020 - Elsevier
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …

TCALAS: Temporal credential-based anonymous lightweight authentication scheme for Internet of drones environment

J Srinivas, AK Das, N Kumar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A user (external party) is interested in accessing the real-time data from some designated
drones of a particular fly zone in the Internet of Drones (IoD) deployment. However, to …

Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks

P Gope, AK Das, N Kumar… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …

BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks

Q Feng, D He, S Zeadally… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
If all vehicles are connected together through a wireless communication channel, vehicular
ad hoc networks (VANETs) can support a wide range of real-time traffic information services …