Suchergebnisse - automated validation of Internet security protocols and applications (AVISPA)

  1. 1

    Secure Message Communication Protocol Among Vehicles in Smart City von Dua, Amit, Kumar, Neeraj, Das, Ashok Kumar, Susilo, Willy

    ISSN: 0018-9545, 1939-9359
    Veröffentlicht: New York IEEE 01.05.2018
    Veröffentlicht in IEEE transactions on vehicular technology (01.05.2018)
    “… Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to …”
    Volltext
    Journal Article
  2. 2

    Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment von Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Vasilakos, Athanasios V., Rodrigues, Joel J. P. C.

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 01.04.2019
    Veröffentlicht in IEEE internet of things journal (01.04.2019)
    “… The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that are referred as drones …”
    Volltext
    Journal Article
  3. 3

    Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems von Srinivas, Jangirala, Das, Ashok Kumar, Li, Xiong, Khan, Muhammad Khurram, Jo, Minho

    ISSN: 1551-3203, 1941-0050
    Veröffentlicht: Piscataway IEEE 01.07.2021
    Veröffentlicht in IEEE transactions on industrial informatics (01.07.2021)
    “… Recent technological evolution in the Internet of Things (IoT) age supports better solutions to magnify the management of the power quality and reliability concerns, and imposes the measures of a smart grid …”
    Volltext
    Journal Article
  4. 4

    ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System von Kumar, Neeraj, Aujla, Gagangeet Singh, Das, Ashok Kumar, Conti, Mauro

    ISSN: 1551-3203, 1941-0050
    Veröffentlicht: Piscataway IEEE 01.12.2019
    Veröffentlicht in IEEE transactions on industrial informatics (01.12.2019)
    “… Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement …”
    Volltext
    Journal Article
  5. 5

    An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments von Banerjee, Soumya, Odelu, Vanga, Das, Ashok Kumar, Chattopadhyay, Samiran, Park, Youngho

    ISSN: 1424-8220, 1424-8220
    Veröffentlicht: Switzerland MDPI 22.02.2020
    Veröffentlicht in Sensors (Basel, Switzerland) (22.02.2020)
    “… In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems …”
    Volltext
    Journal Article
  6. 6

    Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System von Srinivas, Jangirala, Das, Ashok Kumar, Wazid, Mohammad, Vasilakos, Athanasios V.

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 01.05.2021
    Veröffentlicht in IEEE internet of things journal (01.05.2021)
    “… Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party …”
    Volltext
    Journal Article
  7. 7

    Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications von Wazid, Mohammad, Das, Ashok Kumar, Kumar, Neeraj, Alazab, Mamoun

    ISSN: 1551-3203, 1941-0050
    Veröffentlicht: Piscataway IEEE 01.10.2021
    Veröffentlicht in IEEE transactions on industrial informatics (01.10.2021)
    “… 6G-enabled NIB provides high level of flexibility which makes it capable to provide connectivity services for different types of applications as it is effective for the communications …”
    Volltext
    Journal Article
  8. 8

    Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment von Wazid, Mohammad, Das, Ashok Kumar, Khan, Muhammad Khurram, Al-Ghaiheb, Abdulatif Al-Dhawailie, Kumar, Neeraj, Vasilakos, Athanasios V.

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: IEEE 01.10.2017
    Veröffentlicht in IEEE internet of things journal (01.10.2017)
    “… In this paper, we propose a new authentication scheme for medicine anticounterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms …”
    Volltext
    Journal Article
  9. 9

    A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks von Li, Yi, Tian, Yuling

    ISSN: 1932-8184, 1937-9234
    Veröffentlicht: New York IEEE 01.12.2022
    Veröffentlicht in IEEE systems journal (01.12.2022)
    “… With the popularity of WSNs, people's demands for related authentication protocols are developing in a comprehensive and perfect direction, and relevant designs are focusing more on two aspects …”
    Volltext
    Journal Article
  10. 10

    WSN node access authentication protocol based on trusted computing von Liu, Jing, Liu, Lihui, Liu, Zenghui, Lai, Yingxu, Qin, Hua, Luo, Shiyao

    ISSN: 1569-190X, 1878-1462
    Veröffentlicht: Elsevier B.V 01.05.2022
    Veröffentlicht in Simulation modelling practice and theory (01.05.2022)
    “… complete key generation and safe storage, and thus provides security for the access protocol …”
    Volltext
    Journal Article
  11. 11

    Securing unmanned aerial vehicle—heterogeneous networks using functional encryption scheme von Gupta, Sachin Kumar, Gupta, Parul, Singh, Pawan

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.10.2025
    Veröffentlicht in Multimedia tools and applications (01.10.2025)
    “… In today's scenario, as the internet expands at a faster pace, the number of data consumers also increases at an exponential rate …”
    Volltext
    Journal Article
  12. 12
  13. 13

    Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments von Liu, Chao-Liang, Tsai, Wang-Jui, Chang, Ting-Yi, Liu, Ta-Ming

    ISSN: 2073-8994, 2073-8994
    Veröffentlicht: Basel MDPI AG 01.04.2018
    Veröffentlicht in Symmetry (Basel) (01.04.2018)
    “… A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server …”
    Volltext
    Journal Article
  14. 14

    A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve von Rahman, Abid ur, Ullah, Insaf, Naeem, Muhammad, Anwar, Rehan, -, Noor-ul-Amin, Khattak, Hizbullah, Ullah, Sultan

    ISSN: 2158-107X, 2156-5570
    Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2018
    “… The quick advancement of the internet technology requires distinctive message communications over the more extensive territory to upgrade the heterogeneous system security …”
    Volltext
    Journal Article
  15. 15

    Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things von Lara, Evangelina, Aguilar, Leocundo, Sanchez, Mauricio A., García, Jesús A.

    ISSN: 1424-8220, 1424-8220
    Veröffentlicht: Switzerland MDPI AG 16.01.2020
    Veröffentlicht in Sensors (Basel, Switzerland) (16.01.2020)
    “… The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems …”
    Volltext
    Journal Article
  16. 16

    AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment von Wazid, Mohammad, Bagga, Palak, Das, Ashok Kumar, Shetty, Sachin, Rodrigues, Joel J. P. C., Park, Youngho

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 01.10.2019
    Veröffentlicht in IEEE internet of things journal (01.10.2019)
    “… Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments …”
    Volltext
    Journal Article
  17. 17

    Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks von Wazid, Mohammad, Das, Ashok Kumar, Odelu, Vanga, Kumar, Neeraj, Conti, Mauro, Minho Jo

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 01.02.2018
    Veröffentlicht in IEEE internet of things journal (01.02.2018)
    “… In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical applications including smart home, smart city, smart grid …”
    Volltext
    Journal Article
  18. 18

    Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment von Mandal, Shobhan, Bera, Basudeb, Sutrala, Anil Kumar, Das, Ashok Kumar, Choo, Kim-Kwang Raymond, Park, YoungHo

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 01.04.2020
    Veröffentlicht in IEEE internet of things journal (01.04.2020)
    “… User access control is a crucial requirement in any Internet of Things (IoT) deployment, as it allows one to provide authorization, authentication …”
    Volltext
    Journal Article
  19. 19

    Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain von Kim, MyeongHyun, Yu, SungJin, Lee, JoonYoung, Park, YoHan, Park, YoungHo

    ISSN: 1424-8220, 1424-8220
    Veröffentlicht: Switzerland MDPI AG 21.05.2020
    Veröffentlicht in Sensors (Basel, Switzerland) (21.05.2020)
    “… In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are …”
    Volltext
    Journal Article
  20. 20

    Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System von Ryu, Jongseok, Oh, Jihyeon, Kwon, Deokkyu, Son, Seunghwan, Lee, Joonyoung, Park, Yohan, Park, Youngho

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2022
    Veröffentlicht in IEEE access (2022)
    “… In TMIS environments, sensitive data of patients are communicated via an open channel. An adversary may attempt various security attacks including impersonation, replay, and forgery attacks …”
    Volltext
    Journal Article