User authentication schemes for wireless sensor networks: A review

S Kumari, MK Khan, M Atiquzzaman - Ad Hoc Networks, 2015 - Elsevier
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …

Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography

Y Choi, D Lee, J Kim, J Jung, J Nam, D Won - Sensors, 2014 - mdpi.com
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are
widely distributed to monitor various conditions, such as temperature, sound, speed and …

Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks

A Braeken, M Liyanage, P Kumar, J Murphy - Ieee Access, 2019 - ieeexplore.ieee.org
The security of mobile communication largely depends on the strength of the authentication
key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has …

Robust one-time password authentication scheme using smart card for home network environment

B Vaidya, JH Park, SS Yeo, JJPC Rodrigues - Computer Communications, 2011 - Elsevier
Due to the exponential growth of the Internet users and wireless devices, interests on home
networks have been enormously increased in recent days. In digital home networks, home …

[HTML][HTML] An enhanced symmetric-key based 5G-AKA protocol

J Munilla, M Burmester, R Barco - Computer Networks, 2021 - Elsevier
Abstract 5G technology is called to support the next generation of wireless communications
and realize the “Internet of Everything” through its mMTC (massive Machine-Type …

Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability

A Braeken - Computer Networks, 2020 - Elsevier
The recently standardised 5G AKA protocol, to be used in the next generation of mobile
communications, possesses some severe shortcomings. In particular, different types of …

A lightweight digital signature based security scheme for human-centered Internet of Things

MA Mughal, X Luo, A Ullah, S Ullah, Z Mahmood - IEEE access, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) comprises of large number of smart devices that can exchange
sensed data by availing online services. Smart devices can directly interact with the human …

Light-weight secure aggregated data sharing in IoT-enabled wireless sensor networks

G Said, A Ghani, A Ullah, M Azeem, M Bilal… - IEEE …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of physical objects or things that can communicate and
share information. In IoT-enabled Wireless Medical Sensor Network (WMSN), the smart …

Blockchain regulated verifiable and automatic key refreshment mechanism for IoT

RA Mishra, A Kalla, A Braeken, M Liyanage - IEEE Access, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) has proved its applicability in numerous domains, such as
healthcare, agriculture, automobile, industrial production, logistics, and supply chain …

Congestion avoidance for smart devices by caching information in MANETS and IoT

N Akhtar, MA Khan, A Ullah, MY Javed - IEEE Access, 2019 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) comprise a large number of mobile wireless nodes that
can move in a random fashion with the capability to join or leave the network anytime. Due …