Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles

Z Xu, W Liang, KC Li, J Xu, H Jin - Journal of Parallel and Distributed …, 2021 - Elsevier
A fundamental layer of smart cities, the Internet of Vehicles (IoV) can significantly improve
transportation efficiency, reduce energy consumption, and traffic accidents. However …

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

R Amin, N Kumar, GP Biswas, R Iqbal… - Future Generation …, 2018 - Elsevier
With the widespread popularity and usage of Internet-enabled devices, Internet of things has
become one of the most popular techniques of the modern era. However, data generated …

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta… - Computer Networks, 2017 - Elsevier
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

An authenticated key exchange protocol for multi-server architecture in 5G networks

TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the
amount of data, so multi-server distributed cloud computing has been widely used in various …

Lightweight IoT-based authentication scheme in cloud computing circumstance

L Zhou, X Li, KH Yeh, C Su, W Chiu - Future generation computer systems, 2019 - Elsevier
Recently, authentication technologies integrated with the Internet of Things (IoT) and cloud
computing have been promptly investigated for secure data retrieval and robust access …

[HTML][HTML] A systematic literature review of authentication in Internet of Things for heterogeneous devices

S Kavianpour, B Shanmugam, S Azam… - Journal of Computer …, 2019 - hindawi.com
Internet of Things (IoT) has become one of the most significant technologies in recent years
because of possessing the diverse application domains. The variety of applications results …

Game theory-based authentication framework to secure internet of vehicles with blockchain

M Gupta, R Kumar, S Shekhar, B Sharma, RB Patel… - Sensors, 2022 - mdpi.com
The Internet of Vehicles (IoV) is a new paradigm for vehicular networks. Using diverse
access methods, IoV enables vehicles to connect with their surroundings. However, without …

An enhanced smart card based remote user password authentication scheme

X Li, J Niu, MK Khan, J Liao - Journal of Network and Computer …, 2013 - Elsevier
Smart card based password authentication is one of the simplest and efficient authentication
mechanisms to ensure secure communication in insecure network environments. Recently …