Search Results - automated validation of Internet security protocols and applications (AVISPA)

Refine Results
  1. 1

    Secure Message Communication Protocol Among Vehicles in Smart City by Dua, Amit, Kumar, Neeraj, Das, Ashok Kumar, Susilo, Willy

    ISSN: 0018-9545, 1939-9359
    Published: New York IEEE 01.05.2018
    Published in IEEE transactions on vehicular technology (01.05.2018)
    “…Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to…”
    Get full text
    Journal Article
  2. 2

    Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment by Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Vasilakos, Athanasios V., Rodrigues, Joel J. P. C.

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.04.2019
    Published in IEEE internet of things journal (01.04.2019)
    “…The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that are referred as drones…”
    Get full text
    Journal Article
  3. 3

    Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems by Srinivas, Jangirala, Das, Ashok Kumar, Li, Xiong, Khan, Muhammad Khurram, Jo, Minho

    ISSN: 1551-3203, 1941-0050
    Published: Piscataway IEEE 01.07.2021
    “…Recent technological evolution in the Internet of Things (IoT) age supports better solutions to magnify the management of the power quality and reliability concerns, and imposes the measures of a smart grid…”
    Get full text
    Journal Article
  4. 4

    ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System by Kumar, Neeraj, Aujla, Gagangeet Singh, Das, Ashok Kumar, Conti, Mauro

    ISSN: 1551-3203, 1941-0050
    Published: Piscataway IEEE 01.12.2019
    “… Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement…”
    Get full text
    Journal Article
  5. 5

    An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments by Banerjee, Soumya, Odelu, Vanga, Das, Ashok Kumar, Chattopadhyay, Samiran, Park, Youngho

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI 22.02.2020
    Published in Sensors (Basel, Switzerland) (22.02.2020)
    “…In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems…”
    Get full text
    Journal Article
  6. 6

    Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System by Srinivas, Jangirala, Das, Ashok Kumar, Wazid, Mohammad, Vasilakos, Athanasios V.

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.05.2021
    Published in IEEE internet of things journal (01.05.2021)
    “…Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party…”
    Get full text
    Journal Article
  7. 7

    Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications by Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Alazab, Mamoun

    ISSN: 1551-3203, 1941-0050
    Published: Piscataway IEEE 01.10.2021
    “… 6G-enabled NIB provides high level of flexibility which makes it capable to provide connectivity services for different types of applications as it is effective for the communications…”
    Get full text
    Journal Article
  8. 8

    Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment by Wazid, Mohammad, Das, Ashok Kumar, Khan, Muhammad Khurram, Al-Ghaiheb, Abdulatif Al-Dhawailie, Kumar, Neeraj, Vasilakos, Athanasios V.

    ISSN: 2327-4662, 2327-4662
    Published: IEEE 01.10.2017
    Published in IEEE internet of things journal (01.10.2017)
    “… In this paper, we propose a new authentication scheme for medicine anticounterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms…”
    Get full text
    Journal Article
  9. 9

    A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks by Li, Yi, Tian, Yuling

    ISSN: 1932-8184, 1937-9234
    Published: New York IEEE 01.12.2022
    Published in IEEE systems journal (01.12.2022)
    “… With the popularity of WSNs, people's demands for related authentication protocols are developing in a comprehensive and perfect direction, and relevant designs are focusing more on two aspects…”
    Get full text
    Journal Article
  10. 10

    WSN node access authentication protocol based on trusted computing by Liu, Jing, Liu, Lihui, Liu, Zenghui, Lai, Yingxu, Qin, Hua, Luo, Shiyao

    ISSN: 1569-190X, 1878-1462
    Published: Elsevier B.V 01.05.2022
    Published in Simulation modelling practice and theory (01.05.2022)
    “… complete key generation and safe storage, and thus provides security for the access protocol…”
    Get full text
    Journal Article
  11. 11

    Securing unmanned aerial vehicle—heterogeneous networks using functional encryption scheme by Gupta, Sachin Kumar, Gupta, Parul, Singh, Pawan

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.10.2025
    Published in Multimedia tools and applications (01.10.2025)
    “…In today's scenario, as the internet expands at a faster pace, the number of data consumers also increases at an exponential rate…”
    Get full text
    Journal Article
  12. 12
  13. 13

    Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments by Liu, Chao-Liang, Tsai, Wang-Jui, Chang, Ting-Yi, Liu, Ta-Ming

    ISSN: 2073-8994, 2073-8994
    Published: Basel MDPI AG 01.04.2018
    Published in Symmetry (Basel) (01.04.2018)
    “…A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server…”
    Get full text
    Journal Article
  14. 14

    A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve by Rahman, Abid ur, Ullah, Insaf, Naeem, Muhammad, Anwar, Rehan, -, Noor-ul-Amin, Khattak, Hizbullah, Ullah, Sultan

    ISSN: 2158-107X, 2156-5570
    Published: West Yorkshire Science and Information (SAI) Organization Limited 2018
    “… The quick advancement of the internet technology requires distinctive message communications over the more extensive territory to upgrade the heterogeneous system security…”
    Get full text
    Journal Article
  15. 15

    Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things by Lara, Evangelina, Aguilar, Leocundo, Sanchez, Mauricio A., García, Jesús A.

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI AG 16.01.2020
    Published in Sensors (Basel, Switzerland) (16.01.2020)
    “…The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems…”
    Get full text
    Journal Article
  16. 16

    AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment by Wazid, Mohammad, Bagga, Palak, Das, Ashok Kumar, Shetty, Sachin, Rodrigues, Joel J. P. C., Park, Youngho

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.10.2019
    Published in IEEE internet of things journal (01.10.2019)
    “…Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments…”
    Get full text
    Journal Article
  17. 17

    Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks by Wazid, Mohammad, Das, Ashok Kumar, Odelu, Vanga, Kumar, Neeraj, Conti, Mauro, Minho Jo

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.02.2018
    Published in IEEE internet of things journal (01.02.2018)
    “…In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical applications including smart home, smart city, smart grid…”
    Get full text
    Journal Article
  18. 18

    Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment by Mandal, Shobhan, Bera, Basudeb, Sutrala, Anil Kumar, Das, Ashok Kumar, Choo, Kim-Kwang Raymond, Park, YoungHo

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.04.2020
    Published in IEEE internet of things journal (01.04.2020)
    “…User access control is a crucial requirement in any Internet of Things (IoT) deployment, as it allows one to provide authorization, authentication…”
    Get full text
    Journal Article
  19. 19

    Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain by Kim, MyeongHyun, Yu, SungJin, Lee, JoonYoung, Park, YoHan, Park, YoungHo

    ISSN: 1424-8220, 1424-8220
    Published: Switzerland MDPI AG 21.05.2020
    Published in Sensors (Basel, Switzerland) (21.05.2020)
    “…In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are…”
    Get full text
    Journal Article
  20. 20

    Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System by Ryu, Jongseok, Oh, Jihyeon, Kwon, Deokkyu, Son, Seunghwan, Lee, Joonyoung, Park, Yohan, Park, Youngho

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2022
    Published in IEEE access (2022)
    “… In TMIS environments, sensitive data of patients are communicated via an open channel. An adversary may attempt various security attacks including impersonation, replay, and forgery attacks…”
    Get full text
    Journal Article