A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks

G Thakur, S Prajapat, P Kumar, CM Chen - Journal of Systems Architecture, 2024 - Elsevier
Recently, Sahoo et al. introduced a three-factor authentication scheme for Wireless Sensor
Networks (WSNs) based on an elliptic curve cryptosystem. Nonetheless, upon closer …

An efficient provably secure authentication and key agreement protocol for satellite communication networks

G Thakur, MS Obaidat, P Sharma… - Security and …, 2024 - Wiley Online Library
The leverage of satellite resources to establish a communication network offers a wide
range of benefits, including the capability to support news gathering, broadcasting, and …

Quantum image encryption protocol for secure communication in healthcare networks

S Prajapat, D Kumar, P Kumar - Cluster Computing, 2025 - Springer
Maintaining patient confidentiality and ensuring data integrity are critical aspects of
healthcare information security. In response to the growing need for enhanced security …

An improved ultra-lightweight anonymous authenticated key agreement protocol for wearable devices

X Ai, A Badshah, S Tu, M Waqas… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
For wearable devices with constrained computational resources, it is typically required to
offload processing tasks to more capable servers. However, this practice introduces …

BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment

A Chaurasia, A Kumar, UP Rao - Cluster Computing, 2024 - Springer
The increasing number of edge layer devices connected to fog servers in fog computing
environments has led to a rise in vulnerable and unauthorized actions. Implementing …

[HTML][HTML] A Survey on Exploring the Challenges and Applications of Wireless Body Area Networks (WBANs)

AS Rajasekaran, L Sowmiya, A Maria… - Cyber Security and …, 2024 - Elsevier
Networks play an important role in the day-to-day life of every individual. Networks are
involved in the transmission of necessary information between the sender and receiver in …

Intelligent two-phase dual authentication framework for Internet of Medical Things

M Asif, M Abrar, A Salam, F Amin, F Ullah, S Shah… - Scientific Reports, 2025 - nature.com
Abstract The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing
real-time monitoring and data-driven treatments. Nevertheless, the security of …

SC-VDTwinAuth: Smart-Contract Assisted Handover Authentication Protocol for Vehicular Digital Twin Network

D Gautam, G Thakur, S Prajapat, P Kumar - Vehicular Communications, 2025 - Elsevier
Vehicular digital twin network is partitioned into multiple networks either due to the
geographical differences or their accelerating expansion, which necessitates a secure and …

Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications

S Prajapat, G Thakur, P Kumar, AK Das… - Computers and …, 2025 - Elsevier
The quantum crisis presents a grave threat to patient health, the vast and lucrative
healthcare industry, society, and national security. If current cryptographic systems …

A provably secure authenticated key agreement protocol for industrial sensor network system

G Thakur, MS Obaidat, P Sharma… - Concurrency and …, 2024 - Wiley Online Library
The convergence of reliable and self‐organizing characteristics of Wireless Sensor
Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios …