[HTML][HTML] EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element

C Patel, AK Bashir, AA AlZubi, R Jhaveri - Digital Communications and …, 2023 - Elsevier
Abstract Industrial IoT (IIoT) aims to enhance services provided by various industries, such
as manufacturing and product processing. IIoT suffers from various challenges, and security …

Securing critical user information over the internet of medical things platforms using a hybrid cryptography scheme

OC Abikoye, ET Oladipupo, AL Imoize, JB Awotunde… - Future Internet, 2023 - mdpi.com
The application of the Internet of Medical Things (IoMT) in medical systems has brought
much ease in discharging healthcare services by medical practitioners. However, the …

VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain

M Kara, HRJ Merzeh, MA Aydın, HH Balık - Computer Communications, 2023 - Elsevier
Abstract Confidentiality, availability, integrity, authentication, and non-repudiation when
together became the top priority for secure communication. However, authentication is the …

Secure lightweight key exchange using ECC for user-gateway paradigm

C Patel, N Doshi - IEEE Transactions on Computers, 2020 - ieeexplore.ieee.org
Internet of Things (IoT)-based services connect the user with sensing devices through
intermediary devices like a gateway. The authentication with secure key exchange assures …

Internet of Things Authentication Protocols: Comparative Study.

S Dargaoui, M Azrour, A El Allaoui… - Computers …, 2024 - search.ebscohost.com
Nowadays, devices are connected across all areas, from intelligent buildings and smart
cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things …

[HTML][HTML] Elliptic curve signcryption-based mutual authentication protocol for smart cards

AK Singh, A Solanki, A Nayyar, B Qureshi - Applied Sciences, 2020 - mdpi.com
In the modern computing environment, smart cards are being used extensively, which are
intended to authenticate a user with the system or server. Owing to the constrictions of …

A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol

M Nikooghadam, H Amintoosi - Security and privacy, 2020 - Wiley Online Library
Session initiation protocol (SIP) is known as multimedia communication protocol based on
IP, which is leveraged to provide signaling as well as instant messaging services. Since SIP …

An efficient fractional Chebyshev chaotic map-based three-factor session initiation protocol for the human-centered IoT architecture

C Meshram, CC Lee, I Bahkali, AL Imoize - Mathematics, 2023 - mdpi.com
One of the most frequently used signaling techniques for initiating, sustaining, and
dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are …

Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme

M Nikooghadam, H Amintoosi - International Journal of …, 2023 - Wiley Online Library
Summary Internet of Things (IoT) is a newly emerged paradigm where multiple embedded
devices, known as things, are connected via the Internet to collect, share, and analyze data …

Robust lightweight privacy-preserving and session scheme interrogation for fog computing systems

BD Deebak, F Al-Turjman - Journal of Information Security and Applications, 2021 - Elsevier
Abstract Session Initiation Protocol (SIP) is a communication protocol of multimedia systems
providing IP signaling to initiate instant messaging. The rapid growth of wireless …