Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

Privacy-preserving schemes for ad hoc social networks: A survey

MA Ferrag, L Maglaras, A Ahmim - … Communications Surveys & …, 2017 - ieeexplore.ieee.org
We review the state of the art of privacypreserving schemes for ad hoc social networks
including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication

K Mahmood, SA Chaudhry, H Naqvi, S Kumari… - Future Generation …, 2018 - Elsevier
An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of
electricity generation by providing the capability to monitor the consumption behavior of …

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

R Amin, N Kumar, GP Biswas, R Iqbal… - Future Generation …, 2018 - Elsevier
With the widespread popularity and usage of Internet-enabled devices, Internet of things has
become one of the most popular techniques of the modern era. However, data generated …

A robust and anonymous patient monitoring system using wireless medical sensor networks

R Amin, SKH Islam, GP Biswas, MK Khan… - Future Generation …, 2018 - Elsevier
In wireless medical sensor network (WMSN), bio-sensors are implanted within the patient
body to sense the sensitive information of a patient which later on can be transmitted to the …

A lightweight user authentication scheme for cloud-IoT based healthcare services

G Sharma, S Kalra - Iranian Journal of Science and Technology …, 2019 - Springer
With the ongoing revolution of cloud computing and Internet of Things, remote patient
monitoring has become feasible. These networking paradigms are widely used to provide …

Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model

Q **e, DS Wong, G Wang, X Tan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each
other and generate a session key for the subsequent communications. With the rapid …

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

A Kumari, S Jangirala, MY Abbasi, V Kumar… - Journal of Information …, 2020 - Elsevier
Smart card based user server mutual authentication framework is famous for safe
communication via unfavorable and insecure communication system. The authenticated …

An improved and provably secure privacy preserving authentication protocol for SIP

SA Chaudhry, H Naqvi, M Sher, MS Farash… - Peer-to-Peer Networking …, 2017 - Springer
Abstract Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any
multimedia based application or IP-based telephony service that requires signaling. SIP …