Quantum-safe secure and authorized communication protocol for internet of drones

D Mishra, M Singh, P Rewal… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Remotely-Controlled Aerial Vehicles (RCAV), popularly known as drones, have gained wide
popularity in several applications from military to civilian due to the usage of sensors …

A secure lightweight mutual authentication scheme in social industrial IoT environment

A Ben Amor, S Jebri, M Abid, A Meddeb - The Journal of Supercomputing, 2023 - Springer
Abstract The Social Industrial Internet of Things (SIIoT) is a new paradigm that integrates
social networking features into the Industrial IoT (IIoT) environment to enforce efficient and …

PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks

R Ma, J Cao, D Feng, H Li, Y Zhang, X Lv - Ad Hoc Networks, 2019 - Elsevier
To ensure secure and seamless handovers inter-Evolved Universal Terrestrial Radio
Access Network (E-UTRAN) is a key issue in LTE-A networks. Due to the introduction of …

PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network

J Guo, Y Du, D Zhang, R Wu - Journal of Information Security and …, 2023 - Elsevier
With the rapid development of satellite computing and communication capabilities, Space
Information Network (SIN) makes it possible for users to obtain subscription services …

Lattice-based key agreement protocol under ring-LWE problem for IoT-enabled smart devices

S Rana, D Mishra - Sādhanā, 2021 - Springer
Advances in communication technologies along with the availability of Internet and Internet
of Things (IoT) devices enable users to acquire various services over the Internet. However …

Blockchain-based privacy-preserving authentication protocol for UAV networks

MA Akram, H Ahmad, AN Mian, AD Jurcut, S Kumari - Computer Networks, 2023 - Elsevier
Unmanned aerial vehicles (UAVs) are getting common in the market nowadays and being
used in numerous real-time applications because they are lightweight, cost-effective, easy to …

A Secure and Privacy‐Preserving Three‐Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things

Q Xie, Z Ding, B Hu - Security and communication networks, 2021 - Wiley Online Library
The Internet of things is playing more and more important role in smart healthcare, smart
grids, and smart transportation, and using wireless sensor network (WSN), we can easily …

Anonymous and expeditious mobile user authentication scheme for glomonet environments

P Gope, SKH Islam, MS Obaidat, R Amin… - International Journal …, 2018 - Wiley Online Library
Summary The Global Mobility Network (GLOMONET) is rapidly becoming important as well
as a popular feature in today's high‐performance network. The legal mobile users enjoy life …

An improved anonymous DoS-resistant authentication protocol in smart city

R Chen, Y Mou, M Zhang - Wireless Networks, 2022 - Springer
With the development and practical application of 5G technology, the construction of smart
cities has progressed into an entirely new level. Mobile wireless networks in smart cities …

Post-quantum secure remote password protocol from RLWE problem

X Gao, J Ding, J Liu, L Li - … 13th International Conference, Inscrypt 2017, Xi' …, 2018 - Springer
Abstract Secure Remote Password (SRP) protocol is an augmented Password-based
Authenticated Key Exchange (PAKE) protocol based on discrete logarithm problem (DLP) …