On the design of conditional privacy preserving batch verification-based authentication scheme for internet of vehicles deployment

AK Sutrala, P Bagga, AK Das, N Kumar… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
authentication schemes for VANETs and IoVs. In Section III, we provide the network model
of IoV along with the threat model … the requests. Finally, a summary of the existing state-of-art …

Cyber security threats, vulnerabilities, and security solutions models in banking

D Ghelani, TK Hua, SKR Koduru - Authorea Preprints, 2022 - authorea.com
… used to enable every transaction by a bank's customer. This … a technology by offering an
application and a technique for … to collect data to authenticate the smart online banking system. It …

Decentralized authentication of distributed patients in hospital networks using blockchain

A Yazdinejad, G Srivastava, RM Parizi… - IEEE journal of …, 2020 - ieeexplore.ieee.org
… analysis of our model in relation to a base model of the … the number of requests of health
transactions that are completed … our proposed architecture and the base model. Due to the fact …

New enhanced authentication protocol for internet of things

M Azrour, J Mabrouki, A Guezzaz… - Big Data Mining and …, 2021 - ieeexplore.ieee.org
… presented different authentication protocol models based on … patient information in healthcare
application. Subsequently, … notice that modular inversion operation, symmetric encryption…

Improved ECC‐based three‐factor multiserver authentication scheme

TY Wu, L Yang, Z Lee, CM Chen… - Security and …, 2021 - Wiley Online Library
… secure in the ROR model and overcome known attacks using … was utilized in a practical
application, the 13.5 ms difference … T p , time for performing elliptic curve point addition operation

Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions

B Bhushan, C Sahoo, P Sinha, A Khamparia - Wireless Networks, 2021 - Springer
… security, confidentiality and authentication in BIoT [23]. … working model of blockchain
technology, phases of operations … 1.1, this paper brings forth a holistic approach for application of …

MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions

N Kabra, P Bhattacharya, S Tanwar, S Tyagi - Future Generation Computer …, 2020 - Elsevier
… a dual authentication algorithm to allow seamless operations … This section describes the
blockchain cheque and payment model of … wallet application and sign a blockchain cheque. The …

A privacy-preserving and scalable authentication protocol for the internet of vehicles

MN Aman, U Javaid, B Sikdar - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… of transactions and preserves data integrity via vehicle … We can model the adversary’s
advantage for successfully … both authentication (auth) packets as well as application packets. The …

An identity management and authentication scheme based on redactable blockchain for mobile networks

J Xu, K Xue, H Tian, J Hong, DSL Wei… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… ’s authentication request needs to be sent to the core network. Centralized authentication
leads … We review related work in Section II, and introduce the system model, threat model and …

A lightweight mutual authentication protocol for V2V communication in internet of vehicles

H Vasudev, V Deshpande, D Das… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… In Section III, we explain the architecture of our proposed model. This includes defining the
requested server that satisfies the query and not an impersonator. The login, authentication, …