Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication

K Mahmood, SA Chaudhry, H Naqvi, S Kumari… - Future Generation …, 2018 - Elsevier
An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of
electricity generation by providing the capability to monitor the consumption behavior of …

A lightweight multi-layer authentication protocol for wireless body area networks

J Shen, S Chang, J Shen, Q Liu, X Sun - Future generation computer …, 2018 - Elsevier
Nowadays, the technology of Internet of Things (IoT) is getting more and more important
which brings a lot of convenience to people's life and city's development. As a key …

Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries

D He, N Kumar, S Zeadally, A Vinel… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Privacy-preserving data aggregation (P2DA) is an important basic building block that can
protect consumer's privacy in the smart grid environment because it could be used to …

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs

SKH Islam, MS Obaidat, P Vijayakumar… - Future Generation …, 2018 - Elsevier
With the rapid growth of information and communication technology (ICT) and Internet of
things (IoT), the concept of smart-city is recently introduced by the government of many …

Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures

D He, S Zeadally, N Kumar… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Rapid advances in wireless communication technologies have paved the way for a wide
range of mobile devices to become increasingly ubiquitous and popular. Mobile devices …

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo… - Journal of Network and …, 2017 - Elsevier
Wireless sensor networks (WSNs) for Internet of Things (IoT) can be deployed in a wide
range of industries such as agriculture and military. However, designing a secure and …

Secure key agreement and key protection for mobile device user authentication

L Wu, J Wang, KKR Choo, D He - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As mobile devices ownership becomes more prevalent (eg, a user owns multiple mobile
devices), the capability to offer secure and user friendly authentication becomes increasingly …

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography

D He, H Wang, MK Khan, L Wang - Iet Communications, 2016 - Wiley Online Library
Due to efficiency, security and reliability, the smart grid attracts more and more attentions
from both industry and researchers. To implement secure communication in the smart grid …

A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network

D He, N Kumar, H Wang, L Wang… - … on Dependable and …, 2016 - ieeexplore.ieee.org
With rapid developments of sensor, wireless and mobile communication technologies,
Mobile Healthcare Social Networks (MHSNs) have emerged as a popular means of …