A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

Privacy-Preserving AI Framework for 6G-Enabled Consumer Electronics

X Wang, J Lyu, JD Peter, BG Kim - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In the realm of consumer electronics for 6G communication, AI has emerged as a significant
player. However, the proliferation of devices at the edge of network causes the generation of …

TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network

N Nisa, AS Khan, Z Ahmad… - International Journal of …, 2024 - Wiley Online Library
Software‐defined networking (SDN) has received considerable attention and adoption
owing to its inherent advantages, such as enhanced scalability, increased adaptability, and …

Integrated secure distance bounding and hardware-based security: A case study for the insurance claim verification of farmers during COVID-19

A Kanak, S Ergün, İ Arif… - Open …, 2023 - open-research-europe.ec.europa.eu
Given the rapidly evolving developments in Fintech, Insurtech, Open Banking, and Mobile
Money business models in recent years, the capability for ensuring strong authentication …

An Analysis of Edge Communication Architectures for Ultra-Dense Fog Networks

RP Singh, G Mishra, MK Singh… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
In ultra-dense fog networks, faceted conversation architectures are crucial because they
provide low latency, high capacity, and electricity-green speech communication. Several …

Recapitulation of Survey on Taxonomy: Security Unmanned Aerial Vehicles Networks

VS Kilat, AS Khan, E James… - Journal of Computing …, 2023 - publisher.unimas.my
The operation of unmanned aerial vehicles (UAVs) presents various challenges for radio
spectrum management. It is crucial to ensure safety, effective spectrum use, and …

Blockchain-Based Lightweight Authentication and Key Exchange Protocol For Unmanned Aerial Vehicle

P Kumar, B Mohanraj, E Munuswamy… - … Conference on New …, 2023 - ieeexplore.ieee.org
The proposed authentication and key exchange protocol for unmanned aerial vehicles
(UAVs) are based on a combination of elliptic curve cryptography, symmetric cryptography …