Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications

CM Chen, KH Wang, KH Yeh, B Xiang… - Journal of Ambient …, 2019 - Springer
A secure authenticated key exchange protocol is an essential key to bootstrap a secure
wireless communication. Various research have been conducted to study the efficiency and …

An improved anonymous authentication scheme for distributed mobile cloud computing services

SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon - Cluster Computing, 2019 - Springer
Mobile cloud computing blend mobile and cloud computing together with the help of
wireless communication technology to achieve benefits for the stakeholders. These …

Efficient utilization of elliptic curve cryptography in design of a three-factor authentication protocol for satellite communications

A Ostad-Sharif, D Abbasinezhad-Mood… - Computer …, 2019 - Elsevier
Satellite communications are one of the significant methods of communications, which can
be used in long distances and in conditions that the other means of communications cannot …

Novel anonymous key establishment protocol for isolated smart meters

D Abbasinezhad-Mood, A Ostad-Sharif… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In a smart grid, fine-grained usage reports of consumers are gathered using some
computationally constrained smart measurement devices. One of the most challenging …

[PDF][PDF] Multilayer neural network synchronized secured session key based encryption in wireless communication

A Sarkar - IAES International Journal of Artificial …, 2019 - download.garuda.kemdikbud.go.id
In this paper, multilayer neural network synchronized session key based encryption has
been proposed for wireless communication of data/information. Multilayer perceptron …

AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities

JL Li, WG Zhang, V Dabra, KKR Choo, S Kumari… - Journal of Network and …, 2019 - Elsevier
Mobile devices are an integral part of our society, although ensuring the security and privacy
of both data-at-rest and data-in-transit remains topics of ongoing interest. Privacy-preserving …

Design of a lightweight and anonymous authenticated key agreement protocol for wireless body area networks

A Ostad‐Sharif, M Nikooghadam… - International Journal …, 2019 - Wiley Online Library
Wireless body area networks (WBANs) are a network designed to gather critical information
about the physical conditions of patients and to exchange this information. WBANs are …

A lightweight elliptic-Elgamal-based authentication scheme for secure device-to-device communication

A Abro, Z Deng, KA Memon - Future Internet, 2019 - mdpi.com
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended
coverage where devices can act as users or relays. These relays normally act as decode …

Authentic caller: Self-enforcing authentication in a next-generation network

MA Azad, S Bag, C Perera… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) or the cyber-physical system (CPS) is the network of connected
devices, things, and people that collect and exchange information using the emerging …

An improved and efficient mutual authentication scheme for session initiation protocol

Y Zhang, K Xie, O Ruan - PloS one, 2019 - journals.plos.org
Qiu et al. made a security analysis about the protocols of Chaudhry et al. and Kumari et al. in
2018, and they pointed out that there are many security weaknesses in the protocols. To …