User authentication schemes for wireless sensor networks: A review
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very
common to those which demand crucial security concerns. The deployment of WSNs in …
common to those which demand crucial security concerns. The deployment of WSNs in …
Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are
widely distributed to monitor various conditions, such as temperature, sound, speed and …
widely distributed to monitor various conditions, such as temperature, sound, speed and …
Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks
The security of mobile communication largely depends on the strength of the authentication
key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has …
key exchange protocol. The 3rd Generation Partnership Project (3GPP) Group has …
Robust one-time password authentication scheme using smart card for home network environment
Due to the exponential growth of the Internet users and wireless devices, interests on home
networks have been enormously increased in recent days. In digital home networks, home …
networks have been enormously increased in recent days. In digital home networks, home …
[HTML][HTML] An enhanced symmetric-key based 5G-AKA protocol
Abstract 5G technology is called to support the next generation of wireless communications
and realize the “Internet of Everything” through its mMTC (massive Machine-Type …
and realize the “Internet of Everything” through its mMTC (massive Machine-Type …
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability
A Braeken - Computer Networks, 2020 - Elsevier
The recently standardised 5G AKA protocol, to be used in the next generation of mobile
communications, possesses some severe shortcomings. In particular, different types of …
communications, possesses some severe shortcomings. In particular, different types of …
A lightweight digital signature based security scheme for human-centered Internet of Things
Internet of Things (IoT) comprises of large number of smart devices that can exchange
sensed data by availing online services. Smart devices can directly interact with the human …
sensed data by availing online services. Smart devices can directly interact with the human …
Light-weight secure aggregated data sharing in IoT-enabled wireless sensor networks
Internet of Things (IoT) is a network of physical objects or things that can communicate and
share information. In IoT-enabled Wireless Medical Sensor Network (WMSN), the smart …
share information. In IoT-enabled Wireless Medical Sensor Network (WMSN), the smart …
Blockchain regulated verifiable and automatic key refreshment mechanism for IoT
Internet of Things (IoT) has proved its applicability in numerous domains, such as
healthcare, agriculture, automobile, industrial production, logistics, and supply chain …
healthcare, agriculture, automobile, industrial production, logistics, and supply chain …
Congestion avoidance for smart devices by caching information in MANETS and IoT
Mobile ad-hoc networks (MANETs) comprise a large number of mobile wireless nodes that
can move in a random fashion with the capability to join or leave the network anytime. Due …
can move in a random fashion with the capability to join or leave the network anytime. Due …