Suchergebnisse - automated validation of Internet security protocols and applications (AVISPA)
-
1
Secure Message Communication Protocol Among Vehicles in Smart City
ISSN: 0018-9545, 1939-9359Veröffentlicht: New York IEEE 01.05.2018Veröffentlicht in IEEE transactions on vehicular technology (01.05.2018)“… Secure messages exchange among different vehicles is one of the most challenging tasks in future smart cities. Any malicious activity has the potential to …”
Volltext
Journal Article -
2
Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
ISSN: 2327-4662, 2327-4662Veröffentlicht: Piscataway IEEE 01.04.2019Veröffentlicht in IEEE internet of things journal (01.04.2019)“… The Internet of Drones (IoD) provides a coordinated access to unmanned aerial vehicles that are referred as drones …”
Volltext
Journal Article -
3
Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for Internet of Things-Enabled Smart Grid Systems
ISSN: 1551-3203, 1941-0050Veröffentlicht: Piscataway IEEE 01.07.2021Veröffentlicht in IEEE transactions on industrial informatics (01.07.2021)“… Recent technological evolution in the Internet of Things (IoT) age supports better solutions to magnify the management of the power quality and reliability concerns, and imposes the measures of a smart grid …”
Volltext
Journal Article -
4
ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System
ISSN: 1551-3203, 1941-0050Veröffentlicht: Piscataway IEEE 01.12.2019Veröffentlicht in IEEE transactions on industrial informatics (01.12.2019)“… Thus, a robust authentication protocol, which supports dynamic SG device validation and UC addition, both in the local and global domains, is an essential requirement …”
Volltext
Journal Article -
5
An Efficient, Anonymous and Robust Authentication Scheme for Smart Home Environments
ISSN: 1424-8220, 1424-8220Veröffentlicht: Switzerland MDPI 22.02.2020Veröffentlicht in Sensors (Basel, Switzerland) (22.02.2020)“… In recent years, the Internet of Things (IoT) has exploded in popularity. The smart home, as an important facet of IoT, has gained its focus for smart intelligent systems …”
Volltext
Journal Article -
6
Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System
ISSN: 2327-4662, 2327-4662Veröffentlicht: Piscataway IEEE 01.05.2021Veröffentlicht in IEEE internet of things journal (01.05.2021)“… Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (e.g., vehicles) by a legitimate external party …”
Volltext
Journal Article -
7
Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications
ISSN: 1551-3203, 1941-0050Veröffentlicht: Piscataway IEEE 01.10.2021Veröffentlicht in IEEE transactions on industrial informatics (01.10.2021)“… 6G-enabled NIB provides high level of flexibility which makes it capable to provide connectivity services for different types of applications as it is effective for the communications …”
Volltext
Journal Article -
8
Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
ISSN: 2327-4662, 2327-4662Veröffentlicht: IEEE 01.10.2017Veröffentlicht in IEEE internet of things journal (01.10.2017)“… In this paper, we propose a new authentication scheme for medicine anticounterfeiting system in the Internet of Things environment which is used for checking the authenticity of pharmaceutical products (dosage forms …”
Volltext
Journal Article -
9
A Lightweight and Secure Three-Factor Authentication Protocol With Adaptive Privacy-Preserving Property for Wireless Sensor Networks
ISSN: 1932-8184, 1937-9234Veröffentlicht: New York IEEE 01.12.2022Veröffentlicht in IEEE systems journal (01.12.2022)“… With the popularity of WSNs, people's demands for related authentication protocols are developing in a comprehensive and perfect direction, and relevant designs are focusing more on two aspects …”
Volltext
Journal Article -
10
WSN node access authentication protocol based on trusted computing
ISSN: 1569-190X, 1878-1462Veröffentlicht: Elsevier B.V 01.05.2022Veröffentlicht in Simulation modelling practice and theory (01.05.2022)“… complete key generation and safe storage, and thus provides security for the access protocol …”
Volltext
Journal Article -
11
Securing unmanned aerial vehicle—heterogeneous networks using functional encryption scheme
ISSN: 1573-7721, 1380-7501, 1573-7721Veröffentlicht: New York Springer US 01.10.2025Veröffentlicht in Multimedia tools and applications (01.10.2025)“… In today's scenario, as the internet expands at a faster pace, the number of data consumers also increases at an exponential rate …”
Volltext
Journal Article -
12
Elliptic Curve Cryptography based Secure Image Transmission in Clustered Wireless Sensor Networks
ISSN: 2395-0455, 2395-0455Veröffentlicht: 23.02.2021Veröffentlicht in International Journal of Computer Networks and Applications (23.02.2021)Volltext
Journal Article -
13
Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
ISSN: 2073-8994, 2073-8994Veröffentlicht: Basel MDPI AG 01.04.2018Veröffentlicht in Symmetry (Basel) (01.04.2018)“… A three-party Authenticated Key Agreement (AKA) protocol in the distributed computing environment is a client that requests services from an application server through an authentication server …”
Volltext
Journal Article -
14
A Lightweight Multi-Message and Multi-Receiver Heterogeneous Hybrid Signcryption Scheme based on Hyper Elliptic Curve
ISSN: 2158-107X, 2156-5570Veröffentlicht: West Yorkshire Science and Information (SAI) Organization Limited 2018Veröffentlicht in International journal of advanced computer science & applications (2018)“… The quick advancement of the internet technology requires distinctive message communications over the more extensive territory to upgrade the heterogeneous system security …”
Volltext
Journal Article -
15
Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
ISSN: 1424-8220, 1424-8220Veröffentlicht: Switzerland MDPI AG 16.01.2020Veröffentlicht in Sensors (Basel, Switzerland) (16.01.2020)“… The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems …”
Volltext
Journal Article -
16
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
ISSN: 2327-4662, 2327-4662Veröffentlicht: Piscataway IEEE 01.10.2019Veröffentlicht in IEEE internet of things journal (01.10.2019)“… Internet of Vehicles (IoV) is an intelligent application of Internet of Things (IoT) in smart transportation that takes intelligent commitments …”
Volltext
Journal Article -
17
Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
ISSN: 2327-4662, 2327-4662Veröffentlicht: Piscataway IEEE 01.02.2018Veröffentlicht in IEEE internet of things journal (01.02.2018)“… In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical applications including smart home, smart city, smart grid …”
Volltext
Journal Article -
18
Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment
ISSN: 2327-4662, 2327-4662Veröffentlicht: Piscataway IEEE 01.04.2020Veröffentlicht in IEEE internet of things journal (01.04.2020)“… User access control is a crucial requirement in any Internet of Things (IoT) deployment, as it allows one to provide authorization, authentication …”
Volltext
Journal Article -
19
Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain
ISSN: 1424-8220, 1424-8220Veröffentlicht: Switzerland MDPI AG 21.05.2020Veröffentlicht in Sensors (Basel, Switzerland) (21.05.2020)“… In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are …”
Volltext
Journal Article -
20
Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2022Veröffentlicht in IEEE access (2022)“… In TMIS environments, sensitive data of patients are communicated via an open channel. An adversary may attempt various security attacks including impersonation, replay, and forgery attacks …”
Volltext
Journal Article