Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks

MA Al Sibahee, VO Nyangaresi… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Internet of Vehicles (IoVs) has greatly improved safety and quality of services in Intelligent
Transportation System (ITS). However, the deployed Dedicated Short-Range …

ESCI-AKA: Enabling secure communication in an iot-enabled smart home environment using authenticated key agreement framework

H Alasmary, M Tanveer - Mathematics, 2023 - mdpi.com
Smart home environments are a vital component of the larger ecosystem within smart cities,
aiming to revolutionize residential living through the integration of Internet of Things (IoT) …

WSNEAP: An efficient authentication protocol for IIoT-oriented wireless sensor networks

F Yi, L Zhang, L Xu, S Yang, Y Lu, D Zhao - Sensors, 2022 - mdpi.com
With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors
need to upload the collected private data to the cloud servers, resulting in a large amount of …

AI-Oriented Two-Phase Multi-Factor Authentication in SAGINs: Prospects and Challenges

B Yang, S Liu, T Xu, C Li, Y Zhu, Z Li… - IEEE Consumer …, 2023 - ieeexplore.ieee.org
Space-air-ground integrated networks (SAGINs), which have emerged as an expansion of
terrestrial networks, provide flexible access, ubiquitous coverage, high-capacity backhaul …

Improvement and cryptanalysis of a physically unclonable functions based authentication scheme for smart grids

M Safkhani, N Bagheri, S Ali, M Hussain Malik… - Mathematics, 2022 - mdpi.com
Authentication protocols are often used in smart grids to deliver the necessary level of
security. A huge number of clients in such a system, however, provides the attacker with the …

Toward designing a secure authentication protocol for IoT environments

M Hosseinzadeh, MH Malik, M Safkhani, N Bagheri… - Sustainability, 2023 - mdpi.com
Authentication protocol is a critical part of any application to manage the access control in
many applications. A former research recently proposed a lightweight authentication …

A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue

J Cui, X Liu, H Zhong, J Zhang, L Wei… - … on Network Science …, 2023 - ieeexplore.ieee.org
Recently, unmanned aerial vehicles (UAVs) configured to provide real-time data for
emergency rescue have been integrated into vehicular ad hoc networks (VANETs) to …

V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment leveraging Physically Unclonable Functions

AG Reddy, PR Babu, V Odelu, L Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Electric vehicle (EV) is a fast-growing technology that could help reduce greenhouse gas
emissions in the energy and transportation sectors. The characteristics of EVs allow for rapid …

Systematic Cryptanalysis of PUF-Based Authentication Protocols for IoT, A Case Study

AMA Modarres, G Sarbishaei - IEEE Networking Letters, 2023 - ieeexplore.ieee.org
Almost all IoT applications require secure user authentication protocols. Due to the
limitations of most IoT devices and the possibility of physical attacks, lightweight …

A new three-factor authentication scheme using Chebyshev chaotic map for peer-to-peer Industrial Internet of Things

K He, Z Ren - Computer Networks, 2024 - Elsevier
Abstract The Industrial Internet of Things (IIoT) is an emerging technology for smart
manufacturing and productivity improvement. Due to the increasing complexity of …