An efficient fractional Chebyshev chaotic map-based three-factor session initiation protocol for the human-centered IoT architecture

C Meshram, CC Lee, I Bahkali, AL Imoize - Mathematics, 2023 - mdpi.com
One of the most frequently used signaling techniques for initiating, sustaining, and
dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are …

An improved three-factor session initiation protocol using Chebyshev chaotic map

XY Guo, DZ Sun, Y Yang - IEEE Access, 2020 - ieeexplore.ieee.org
Session Initiation Protocol (SIP) is the most widely used signalling protocol for controlling
communication, establishing, maintaining, and terminating sessions on the Internet …

Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things

J Srinivas, AK Das, M Wazid… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With an exponential increase in the popularity of Internet, the real-time data collected by
various smart sensing devices can be analyzed remotely by a remote user (eg, a manager) …

Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care

BD Deebak, F Al-Turjman, A Nayyar - Multimedia Tools and Applications, 2021 - Springer
The challenge of COVID-19 has become more prevalent across the world. It is highly
demanding an intelligent strategy to outline the precaution measures until the clinical trials …

[PDF][PDF] An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures.

C Meshram, A Lucky Imoize… - … , Materials & Continua, 2022 - researchgate.net
The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and
privacy concerns. Two users can establish a common session key through a trusted server …

Provably secure pseudo-identity three-factor authentication protocol based on extended chaotic-maps for lightweight mobile devices

D Suresh, V Odelu, AG Reddy, K Phaneendra… - IEEE …, 2022 - ieeexplore.ieee.org
Authentication and key agreement (AKA) play a major role in an open network environment
to communicate between two or more participants securely. Authentication and key …

Anonymous chaotic-based identity authentication protocol in IoT

J Long, X Su - International Journal of Embedded Systems, 2021 - inderscienceonline.com
With the rapid development of internet of things (IoT), the credible identity authentications
among the connected devices are widely investigated by researchers and institutes …

CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing Internet of Things

M Tanveer, MNM Bhutta, BA Alzahrani… - Arabian Journal for …, 2024 - Springer
Abstract Crowdsourcing Internet of Things (IoT) applications have resulted in the
widespread use of smart mobile devices, such as wearable devices and smartphones. E …

A Robust IoT‐Based Three‐Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

F Wang, G Xu, G Xu, Y Wang… - … and Mobile Computing, 2020 - Wiley Online Library
With the development of Internet of Things (IoT) technologies, Internet‐enabled devices
have been widely used in our daily lives. As a new service paradigm, cloud computing aims …

A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security

X Li, J Niu, S Kumari, SKH Islam, F Wu… - Wireless Personal …, 2016 - Springer
The widespread popularity of the computer networks has triggered concerns about
information security. Password-based user authentication with key agreement protocols …