Search Results - automated validation of Internet security protocols and applications (AVISPA)
-
1
Secure Message Communication Protocol Among Vehicles in Smart City
ISSN: 0018-9545, 1939-9359Published: New York IEEE 01.05.2018Published in IEEE transactions on vehicular technology (01.05.2018)“…Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to…”
Get full text
Journal Article -
2
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 01.04.2019Published in IEEE internet of things journal (01.04.2019)“…The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that are referred as drones…”
Get full text
Journal Article -
3
Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems
ISSN: 1551-3203, 1941-0050Published: Piscataway IEEE 01.07.2021Published in IEEE transactions on industrial informatics (01.07.2021)“…Recent technological evolution in the Internet of Things (IoT) age supports better solutions to magnify the management of the power quality and reliability concerns, and imposes the measures of a smart grid…”
Get full text
Journal Article -
4
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System
ISSN: 1551-3203, 1941-0050Published: Piscataway IEEE 01.12.2019Published in IEEE transactions on industrial informatics (01.12.2019)“… Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement…”
Get full text
Journal Article -
5
An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
ISSN: 1424-8220, 1424-8220Published: Switzerland MDPI 22.02.2020Published in Sensors (Basel, Switzerland) (22.02.2020)“…In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems…”
Get full text
Journal Article -
6
Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 01.05.2021Published in IEEE internet of things journal (01.05.2021)“…Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party…”
Get full text
Journal Article -
7
Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications
ISSN: 1551-3203, 1941-0050Published: Piscataway IEEE 01.10.2021Published in IEEE transactions on industrial informatics (01.10.2021)“… 6G-enabled NIB provides high level of flexibility which makes it capable to provide connectivity services for different types of applications as it is effective for the communications…”
Get full text
Journal Article -
8
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
ISSN: 2327-4662, 2327-4662Published: IEEE 01.10.2017Published in IEEE internet of things journal (01.10.2017)“… In this paper, we propose a new authentication scheme for medicine anticounterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms…”
Get full text
Journal Article -
9
A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks
ISSN: 1932-8184, 1937-9234Published: New York IEEE 01.12.2022Published in IEEE systems journal (01.12.2022)“… With the popularity of WSNs, people's demands for related authentication protocols are developing in a comprehensive and perfect direction, and relevant designs are focusing more on two aspects…”
Get full text
Journal Article -
10
WSN node access authentication protocol based on trusted computing
ISSN: 1569-190X, 1878-1462Published: Elsevier B.V 01.05.2022Published in Simulation modelling practice and theory (01.05.2022)“… complete key generation and safe storage, and thus provides security for the access protocol…”
Get full text
Journal Article -
11
Securing unmanned aerial vehicle—heterogeneous networks using functional encryption scheme
ISSN: 1573-7721, 1380-7501, 1573-7721Published: New York Springer US 01.10.2025Published in Multimedia tools and applications (01.10.2025)“…In today's scenario, as the internet expands at a faster pace, the number of data consumers also increases at an exponential rate…”
Get full text
Journal Article -
12
Elliptic Curve Cryptography based Secure Image Transmission in Clustered Wireless Sensor Networks
ISSN: 2395-0455, 2395-0455Published: 23.02.2021Published in International Journal of Computer Networks and Applications (23.02.2021)Get full text
Journal Article -
13
Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
ISSN: 2073-8994, 2073-8994Published: Basel MDPI AG 01.04.2018Published in Symmetry (Basel) (01.04.2018)“…A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server…”
Get full text
Journal Article -
14
A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve
ISSN: 2158-107X, 2156-5570Published: West Yorkshire Science and Information (SAI) Organization Limited 2018Published in International journal of advanced computer science & applications (2018)“… The quick advancement of the internet technology requires distinctive message communications over the more extensive territory to upgrade the heterogeneous system security…”
Get full text
Journal Article -
15
Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
ISSN: 1424-8220, 1424-8220Published: Switzerland MDPI AG 16.01.2020Published in Sensors (Basel, Switzerland) (16.01.2020)“…The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems…”
Get full text
Journal Article -
16
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 01.10.2019Published in IEEE internet of things journal (01.10.2019)“…Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments…”
Get full text
Journal Article -
17
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 01.02.2018Published in IEEE internet of things journal (01.02.2018)“…In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical applications including smart home, smart city, smart grid…”
Get full text
Journal Article -
18
Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 01.04.2020Published in IEEE internet of things journal (01.04.2020)“…User access control is a crucial requirement in any Internet of Things (IoT) deployment, as it allows one to provide authorization, authentication…”
Get full text
Journal Article -
19
Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain
ISSN: 1424-8220, 1424-8220Published: Switzerland MDPI AG 21.05.2020Published in Sensors (Basel, Switzerland) (21.05.2020)“…In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are…”
Get full text
Journal Article -
20
Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2022Published in IEEE access (2022)“… In TMIS environments, sensitive data of patients are communicated via an open channel. An adversary may attempt various security attacks including impersonation, replay, and forgery attacks…”
Get full text
Journal Article