Anonymous authentication for wireless body area networks with provable security
Advances in wireless communications, embedded systems, and integrated circuit
technologies have enabled the wireless body area network (WBAN) to become a promising …
technologies have enabled the wireless body area network (WBAN) to become a promising …
Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …
mobile devices. We start by providing an overview of existing survey articles published in the …
A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing
Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in
cloud computing, although achieving the broad range of security requirements in MEC …
cloud computing, although achieving the broad range of security requirements in MEC …
A lightweight multi-layer authentication protocol for wireless body area networks
Nowadays, the technology of Internet of Things (IoT) is getting more and more important
which brings a lot of convenience to people's life and city's development. As a key …
which brings a lot of convenience to people's life and city's development. As a key …
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
Recently, lots of remote user authentication schemes are implemented on elliptic curve
cryptosystem (ECC) to reduce the computation loads for mobile devices. However, most of …
cryptosystem (ECC) to reduce the computation loads for mobile devices. However, most of …
A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network
M Kumar, S Chand - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Recent advancements in ubiquitous technologies, such as an intelligible sensor, wireless
communication, internet of things, and cloud computing have enabled the wearable devices …
communication, internet of things, and cloud computing have enabled the wearable devices …
A secure mutual authentication protocol for IoT environment
Rapid development in the field of Internet of Things (IoT) has made it possible to connect
many embedded devices to the internet for the sharing of data. Since, the embedded device …
many embedded devices to the internet for the sharing of data. Since, the embedded device …
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic
curve cryptography for the users of mobile devices. We have analyzed the security aspects …
curve cryptography for the users of mobile devices. We have analyzed the security aspects …
Remote authentication schemes for wireless body area networks based on the Internet of Things
Internet of Things (IoT) is a new technology which offers enormous applications that make
people's lives more convenient and enhances cities' development. In particular, smart …
people's lives more convenient and enhances cities' development. In particular, smart …
Design of provably secure authentication protocol for edge-centric maritime transportation system
The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime
Transportation Systems (MTS). Though, it becomes challenging for the centralized cloud …
Transportation Systems (MTS). Though, it becomes challenging for the centralized cloud …