Threat analysis for space information network based on network security attributes: a review

X Wu, Y Du, T Fan, J Guo, J Ren, R Wu… - Complex & Intelligent …, 2023 - Springer
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to
the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much …

Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles

Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are increasingly common, although there remain a number of
limitations that need to be addressed in order for their deployment to be more widespread …

A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT

M Fotouhi, M Bayat, AK Das, HAN Far, SM Pournaghi… - Computer Networks, 2020 - Elsevier
The widespread use of mobile devices, sensors, and wireless sensor networks and the
progressive development of the Internet of Things (IoT) has motivated medical and health …

A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing

X Jia, D He, N Kumar, KKR Choo - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in
cloud computing, although achieving the broad range of security requirements in MEC …

Review of security issues in industrial networks

M Cheminod, L Durante… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Although awareness is constantly rising, that industrial computer networks (in a very broad
sense) can be exposed to serious cyber threats, many people still think that the same …

Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography

Y Choi, D Lee, J Kim, J Jung, J Nam, D Won - Sensors, 2014 - mdpi.com
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are
widely distributed to monitor various conditions, such as temperature, sound, speed and …

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

D Wang, P Wang - Computer Networks, 2014 - Elsevier
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …

Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model

Q Xie, DS Wong, G Wang, X Tan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each
other and generate a session key for the subsequent communications. With the rapid …

A robust biometrics based three-factor authentication scheme for global mobility networks in smart city

X Li, J Niu, S Kumari, F Wu, KKR Choo - Future Generation Computer …, 2018 - Elsevier
Smart city is a development tendency of future city, which improves almost all aspects of
quality of urban residents' life by adopting Information and Communication Technology. In …

An Improved Blockchain‐Based Authentication Protocol for IoT Network Management

M Yavari, M Safkhani, S Kumari… - Security and …, 2020 - Wiley Online Library
Communication security between IoT devices is a major concern in this area, and the
blockchain has raised hopes that this concern will be addressed. In the blockchain concept …