A review on lightweight cryptography for Internet-of-Things based applications

V Rao, KV Prema - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Abstract The Internet-of-Things (IoT) is a combination of an intelligent infrastructure
combined with various self-organizing devices. These devices are used to monitor the …

Security and privacy issues in fog computing

A Ali, M Ahmed, M Imran… - Fog Computing: Theory …, 2020 - Wiley Online Library
Fog computing is now becoming prominent among users due to its on‐demand services and
dynamic resource allocations. Resource allocation and scheduling is a critical task in cloud …

[HTML][HTML] A three-factor anonymous user authentication scheme for Internet of Things environments

H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee - Journal of Information …, 2020 - Elsevier
To accelerate the deployment of fifth-generation (5G) cellular networks, millions of devices
are being connected to massive Internet of Things (IoT) networks. However, advances in the …

[HTML][HTML] Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks

J Jung, J Moon, D Lee, D Won - Sensors, 2017 - mdpi.com
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor
Network (WSN) to securely obtain desired information, and numerous studies have …

[HTML][HTML] An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks

J Jung, J Kim, Y Choi, D Won - Sensors, 2016 - mdpi.com
In wireless sensor networks (WSNs), a registered user can login to the network and use a
user authentication protocol to access data collected from the sensor nodes. Since WSNs …

Authentication protocols for wireless body area network with key management approach

A Joshi, AK Mohapatra - Journal of Discrete Mathematical …, 2019 - Taylor & Francis
Abstract Body Area Network (BAN) is emerging as promising technology for wireless
network and widely being deployed in the field of medical applications for data extraction …

[HTML][HTML] An improved and secure anonymous biometric-based user authentication with key agreement scheme for the integrated EPR information system

J Jung, D Kang, D Lee, D Won - PloS one, 2017 - journals.plos.org
Nowadays, many hospitals and medical institutes employ an authentication protocol within
electronic patient records (EPR) services in order to provide protected electronic …

Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card

C Wang, G Xu - Security and Communication Networks, 2017 - Wiley Online Library
Remote user authentication is the first step to guarantee the security of online services.
Online services grow rapidly and numerous remote user authentication schemes were …

A secure and efficient ECC‐based anonymous authentication protocol

F Wang, G Xu, L Gu - Security and Communication Networks, 2019 - Wiley Online Library
Nowadays, remote user authentication protocol plays a great role in ensuring the security of
data transmission and protecting the privacy of users for various network services. In this …

[HTML][HTML] An improved anonymous authentication scheme for roaming in ubiquitous networks

H Lee, D Lee, J Moon, J Jung, D Kang, H Kim, D Won - PLoS One, 2018 - journals.plos.org
With the evolution of communication technology and the exponential increase of mobile
devices, the ubiquitous networking allows people to use our data and computing resources …