[HTML][HTML] RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks

M Tanveer, SA Aldossari - Alexandria Engineering Journal, 2025 - Elsevier
The rapid expansion of Mobile Edge Computing (MEC) and the Internet of Things (IoT) has
revolutionized technology by enabling real-time data processing at the network edge, which …

RAP-MEC: Robust authentication protocol for the mobile edge computing services

FM Alotaibi, LA Maghrabi, M Tanveer, M Ahmad… - IEEE …, 2024 - ieeexplore.ieee.org
The emergence of edge computing has revolutionized the landscape of modern
applications, offering remarkable advantages such as low-latency and high-bandwidth …

Resots: rfid/iot-enabled secure object tracking key exchange for trustworthy smart logistics

AM Alashjaee, A Irshad, A Daud, A Alhomoud… - Wireless Personal …, 2024 - Springer
Smart logistics is acknowledged as a key propellant for swift industrialization and economic
growth of the nations. It not only helps to foster the cost-effective services to the end user but …

Provably secure and lightweight authentication and key agreement protocol for fog-based vehicular ad-hoc networks

SM Awais, W Yucheng, K Mahmood… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The increase in popularity of vehicles encourages the development of smart cities. With this
advancement, vehicular ad-hoc networks, or VANETs, are now frequently utilized for inter …

An EAADE: Effective Authentication Approach for Data Exchange in Vehicular Social Network for IoV

DK Singh, D Bhardwaj - Security and Privacy, 2024 - Wiley Online Library
In recent years, in order to protect the privacy of vehicular users, federated learning (FL) is
mainly used for secure and reliable data transmission in the vehicular social network …

Multiobjective Secure Trust Aware Redundant Array Shifting Encryption and Clustering Based Routing in Mobile Ad Hoc Networks

KS Prasanna, B Ramesh - International Journal of …, 2024 - Wiley Online Library
Mobile ad hoc networks (MANETs) are characterized by their self‐configuring and
decentralized nature in wireless networking. In MANETs, energy‐constrained devices face …