Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

Healthcare internet of things: Security threats, challenges and future research directions

M Adil, MK Khan, N Kumar, M Attique… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications are switching from general to precise in different
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …

Two birds with one stone: Two-factor authentication with security beyond conventional bound

D Wang, P Wang - IEEE transactions on dependable and …, 2016 - ieeexplore.ieee.org
As the most prevailing two-factor authentication mechanism, smart-card-based password
authentication has been a subject of intensive research in the past two decades, and …

Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks

P Gope, AK Das, N Kumar… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Industrial wireless sensor network (IWSN) is an emerging class of a generalized WSN
having constraints of energy consumption, coverage, connectivity, and security. However …

An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment

MS Farash, M Turkanović, S Kumari, M Hölbl - Ad Hoc Networks, 2016 - Elsevier
The concept of Internet of Things (IOT), which is already at our front doors, is that every
object in the Internet infrastructure (II) is interconnected into a global dynamic expanding …

Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta… - Computer Networks, 2017 - Elsevier
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu… - Future Generation …, 2018 - Elsevier
Abstract Wireless Sensor Network (WSN) is a very important part of Internet of Things (IoT),
especially in e-healthcare applications. Among them, wireless medical sensor networks …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

Authenticated key agreement scheme for fog-driven IoT healthcare system

X Jia, D He, N Kumar, KKR Choo - Wireless Networks, 2019 - Springer
The convergence of cloud computing and Internet of Things (IoT) is partially due to the
pragmatic need for delivering extended services to a broader user base in diverse …