Unboxing fog security: a review of fog security and authentication mechanisms

N Kaliya, D Pawar - Computing, 2023 - Springer
Due to the massive advancement of the Internet of Things in our day-to-day lives, there is a
strong need to bring connectivity to a very accessible level. To enable the execution of real …

Find It With A Pencil: An Efficient Approach for Vulnerability Detection in Authentication Protocols

M Ghahramani - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
Smart devices improve the quality of life by collecting, analyzing, and transmitting data
across different channels. Unfortunately, public media are prone to adversaries, and such …

[HTML][HTML] BCmECC: A lightweight blockchain-based authentication and key agreement protocol for Internet of Things

J Lansky, AM Rahmani, S Ali, N Bagheri, M Safkhani… - Mathematics, 2021 - mdpi.com
In this paper, targeting efficient authentication and key agreement in an IoT environment, we
propose an Elliptic Curve Cryptography-(ECC) based lightweight authentication protocol …

A multipath payment scheme supporting proof of payment

H Qian, L You - Wireless Communications and Mobile …, 2022 - Wiley Online Library
Blockchain technology has always been plagued by performance problems. Given this
problem, many scaling schemes have been put forward. A layer 2 network is a technology …