Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics

MC Chuang, MC Chen - Expert Systems with Applications, 2014 - Elsevier
Password-based remote user authentication schemes are widely investigated, with recent
research increasingly combining a user's biometrics with a password to design a remote …

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

D Wang, P Wang - Computer Networks, 2014 - Elsevier
Anonymity is among the important properties of two-factor authentication schemes for
wireless sensor networks (WSNs) to preserve user privacy. Though impressive efforts have …

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

A Kumari, S Jangirala, MY Abbasi, V Kumar… - Journal of Information …, 2020 - Elsevier
Smart card based user server mutual authentication framework is famous for safe
communication via unfavorable and insecure communication system. The authenticated …

Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks

D Shin, V Sharma, J Kim, S Kwon, I You - IEEE Access, 2017 - ieeexplore.ieee.org
The communication in the Smart Home Internet of Things (SH-IoT) comprising various
electronic devices and sensors is very sensitive and crucial. In addition, the key …

Peer-to-peer cooperative caching for data dissemination in urban vehicular communications

N Kumar, JH Lee - IEEE Systems Journal, 2013 - ieeexplore.ieee.org
Vehicular communications are becoming an emerging technology for safety control, traffic
control, urban monitoring, pollution control, and many other road safety and traffic efficiency …

CPAL: A conditional privacy-preserving authentication with access linkability for roaming service

C Lai, H Li, X Liang, R Lu, K Zhang… - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
The roaming service enables mobile subscribers to access the internet service anytime and
anywhere, which can fulfill the requirement of ubiquitous access for the emerging paradigm …

S6AE: Securing 6LoWPAN using authenticated encryption scheme

M Tanveer, G Abbas, ZH Abbas, M Waqas… - Sensors, 2020 - mdpi.com
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in
the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the …

Secure group mobility support for 6lowpan networks

Y Qiu, M Ma - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
The Internet Protocol version 6 (IPv6) over low power wireless personal area networks
(6LoWPANs) has introduced IP technologies to wireless sensor networks, which significantly …

An optimized network selection and handover triggering scheme for heterogeneous self‐organized wireless networks

M Khan, K Han - Mathematical Problems in Engineering, 2014 - Wiley Online Library
Optimizing the balance between different handover parameters for network selection is one
of the challenging tasks for seamless communication in heterogeneous networks …