A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing

X Jia, D He, N Kumar, KKR Choo - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in
cloud computing, although achieving the broad range of security requirements in MEC …

Authentication in cloud-driven IoT-based big data environment: Survey and outlook

M Wazid, AK Das, R Hussain, G Succi… - Journal of systems …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is composed of different networked objects (ie, smart
devices) which are interconnected to gather, process, refine, and exchange meaningful data …

Secure multifactor authenticated key agreement scheme for industrial IoT

R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The application of Internet of Things (IoT) has generally penetrated into people's life and
become popular in recent years. The IoT devices with different functions are integrated and …

A robust and energy efficient authentication protocol for industrial internet of things

X Li, J Peng, J Niu, F Wu, J Liao… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology and expected to provide solutions for
various industrial fields. As a basic technology of the IoT, wireless sensor networks (WSNs) …

Understanding node capture attacks in user authentication schemes for wireless sensor networks

C Wang, D Wang, Y Tu, G Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Despite decades of intensive research, it is still challenging to design a practical multi-factor
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …

Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system

J Srinivas, AK Das, M Wazid… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Secure access of the real-time data from the Internet-of-Things (IoT) smart devices (eg,
vehicles) by a legitimate external party (user) is an important security service for big data …

Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things

S Roy, S Chatterjee, AK Das… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
The recent proliferation of mobile devices, such as smartphones and wearable devices has
given rise to crowdsourcing Internet of Things (IoT) applications. E-healthcare service is one …

Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications

S Roy, AK Das, S Chatterjee, N Kumar… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Mobile cloud computing (MCC) allows mobile users to have on-demand access to cloud
services. A mobile cloud model helps in analyzing the information regarding the patients' …

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

C Wang, D Wang, G Xu, D He - Science China Information Sciences, 2022 - Springer
Abstract Industry 4.0, which combines information technology, network and industrial
production, is expected to have a tremendous impact on our daily lives. In such a complex …

Design of secure and lightweight authentication protocol for wearable devices environment

AK Das, M Wazid, N Kumar, MK Khan… - IEEE journal of …, 2017 - ieeexplore.ieee.org
Wearable devices are used in various applications to collect information including step
information, sleeping cycles, workout statistics, and health-related information. Due to the …