[HTML][HTML] Enhancing the security: A lightweight authentication and key agreement protocol for smart medical services in the ioht

TY Wu, L Wang, CM Chen - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) has witnessed significant growth with advancements in Internet
and wireless technologies. In the medical field, the Internet of Health Things (IoHT) has …

Privacy‐preserving authentication scheme for digital twin‐enabled autonomous vehicle environments

CM Chen, Q Miao, S Kumar… - Transactions on Emerging …, 2023 - Wiley Online Library
Currently, the automotive industry has entered a period of considerable advancement,
shifting towards the development of safe, comfortable, and connected autonomous vehicles …

[HTML][HTML] Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

TY Wu, F Kong, Q Meng, S Kumari… - EURASIP Journal on …, 2023 - Springer
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have
gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with …

[PDF][PDF] High Utility Periodic Frequent Pattern Mining in Multiple Sequences.

CM Chen, Z Zhang, J Ming-Tai Wu… - … in Engineering & …, 2023 - cdn.techscience.cn
Periodic pattern mining has become a popular research subject in recent years; this
approach involves the discovery of frequently recurring patterns in a transaction sequence …

EN-LAKP: Lightweight authentication and key agreement protocol for emerging networks

N Anand, MA Saifulla - IEEE Access, 2023 - ieeexplore.ieee.org
In the next generation, emerging network technologies like Software Defined Networking
(SDN) and Wireless Sensor Networks (WSNs) will be developed and deployed to improve …

HAP-SG: Heterogeneous authentication protocol for smart grid

N Egide, F Li - Peer-to-Peer Networking and Applications, 2023 - Springer
Authentication and key agreement (AKA) methods are designed to ensure that only
authorized entities are communicating and to ensure that their communications are secure …

[HTML][HTML] An Enhanced Food Digestion Algorithm for Mobile Sensor Localization

SC Chu, ZY Shao, N Zhong, GG Liu, JS Pan - Sensors, 2023 - mdpi.com
Mobile sensors can extend the range of monitoring and overcome static sensors' limitations
and are increasingly used in real-life applications. Since there can be significant errors in …

Practical and Secure Password Authentication and Key Agreement Scheme Based Dual-Server for IoT Devices in 5G Network

S Zhang, Y Liu, T Gao, Y Xie… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
As the proliferation of 5th Generation Mobile Communication Technology (5G) accelerates
the adoption of Internet of Things (IoT) applications, building robust and secure …

SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network

A Shukla, S Tripathi, M Sajwan, D Singh - Peer-to-Peer Networking and …, 2024 - Springer
In wireless sensor networks (WSN), sensor nodes communicate with one another and
transfer the sensed data to the sink over a wireless medium, making the network vulnerable …

A Novel and Efficient Authentication Scheme Based on UAV‐UAV Environment

Y Zhang, L Meng, J Gan… - … and Mobile Computing, 2023 - Wiley Online Library
Nowadays, unmanned aerial vehicles (UAVs) are used in various fields due to their high
maneuverability and low cost of construction and use. With the development of UAV …