A secure and anonymous user authentication scheme for IoT-enabled smart home environments using PUF

Y Cho, J Oh, D Kwon, S Son, J Lee, Y Park - IEEE Access, 2022 - ieeexplore.ieee.org
With the continuous development of Internet of Things (IoT) technology, research on smart
home environments is being conducted by many researchers. In smart home environments …

Lightweight privacy and confidentiality preserving anonymous authentication scheme for WBANs

J Subramani, A Maria, AS Rajasekaran… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The recent developments in the wireless body area networks (WBAN) play a vital role in the
modern remote health care monitoring system. In WBAN, the deployed intelligent, resource …

TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor

N Singh, AK Das - The Journal of Supercomputing, 2024 - Springer
Security vulnerabilities associated with Internet of Medical Things (IoMT) may lead to health
disasters. The researchers already have designed several lightweight authentication …

Secure and efficient honey list-based authentication protocol for vehicular ad hoc networks

JY Lee, GH Kim, AK Das… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Vehicular Ad Hoc Network (VANET) and Internet of Vehicle (IoV) technologies are
particularly attracting attention from industrial communities because of the intelligent …

LAKS-NVT: Provably secure and lightweight authentication and key agreement scheme without verification table in medical internet of things

K Park, S Noh, H Lee, AK Das, M Kim, Y Park… - IEEE …, 2020 - ieeexplore.ieee.org
Wireless body area networks (WBANs) and wireless sensor networks (WSNs) are important
concepts for the Internet of Things (IoT). They have been applied to various healthcare …

Birthday, name and bifacial-security: understanding passwords of Chinese web users

D Wang, P Wang, D He, Y Tian - 28th USENIX security symposium …, 2019 - usenix.org
Much attention has been paid to passwords chosen by English speaking users, yet only a
few studies have examined how non-English speaking users select passwords. In this …

Improved ECC‐based three‐factor multiserver authentication scheme

TY Wu, L Yang, Z Lee, CM Chen… - Security and …, 2021 - Wiley Online Library
A multiserver environment can improve the efficiency of mobile network services more
effectively than a single server in managing the increase in users. Because of the large …

A lightweight authenticated key agreement protocol using fog nodes in social internet of vehicles

TY Wu, X Guo, L Yang, Q Meng… - Mobile Information …, 2021 - Wiley Online Library
Recently, there has been rapid growth in the Internet of things, the Internet of vehicles, fog
computing, and social Internet of vehicles (SIoV), which can generate large amounts of real …

Understanding security failures of multi-factor authentication schemes for multi-server environments

D Wang, X Zhang, Z Zhang, P Wang - Computers & Security, 2020 - Elsevier
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …

[HTML][HTML] Rotating behind security: A lightweight authentication protocol based on iot-enabled cloud computing environments

TY Wu, Q Meng, S Kumari, P Zhang - Sensors, 2022 - mdpi.com
With the rapid development of technology based on the Internet of Things (IoT), numerous
IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role …