Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks
Wireless Body Area Networks (WBANs) are an emerging industrial technology for
monitoring physiological data. These networks employ medical wearable and implanted …
monitoring physiological data. These networks employ medical wearable and implanted …
On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system
Internet of Vehicles (IoV), a distributed network involving connected vehicles and Vehicular
Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet …
Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet …
A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network
M Kumar, S Chand - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Recent advancements in ubiquitous technologies, such as an intelligible sensor, wireless
communication, internet of things, and cloud computing have enabled the wearable devices …
communication, internet of things, and cloud computing have enabled the wearable devices …
A secure anonymous D2D mutual authentication and key agreement protocol for IoT
Abstract Internet of Things (IoT) is a developing technology in our time that is prone to
security problems as it uses wireless and shared networks. A challenging scenario in IoT …
security problems as it uses wireless and shared networks. A challenging scenario in IoT …
An efficient fractional Chebyshev chaotic map-based three-factor session initiation protocol for the human-centered IoT architecture
One of the most frequently used signaling techniques for initiating, sustaining, and
dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are …
dismissing sessions on the internet is a session initiation protocol (SIP). Currently, SIPs are …
Robust lightweight privacy-preserving and session scheme interrogation for fog computing systems
BD Deebak, F Al-Turjman - Journal of Information Security and Applications, 2021 - Elsevier
Abstract Session Initiation Protocol (SIP) is a communication protocol of multimedia systems
providing IP signaling to initiate instant messaging. The rapid growth of wireless …
providing IP signaling to initiate instant messaging. The rapid growth of wireless …
Elliptic curve signcryption-based mutual authentication protocol for smart cards
In the modern computing environment, smart cards are being used extensively, which are
intended to authenticate a user with the system or server. Owing to the constrictions of …
intended to authenticate a user with the system or server. Owing to the constrictions of …
A provably secure ECC-based roaming authentication scheme for global mobility networks
The advent of Internet of Things have paved the way for providing smart services for mobile
users in the smart city. Due to the rapid movement of users and their fast information …
users in the smart city. Due to the rapid movement of users and their fast information …
Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme
M Nikooghadam, H Amintoosi - International Journal of …, 2023 - Wiley Online Library
Summary Internet of Things (IoT) is a newly emerged paradigm where multiple embedded
devices, known as things, are connected via the Internet to collect, share, and analyze data …
devices, known as things, are connected via the Internet to collect, share, and analyze data …
A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP)
Today, many organizations are transforming their traditional telephone services into Voice
over Internet Protocol (VoIP) systems. These services are simple to implement, but they are …
over Internet Protocol (VoIP) systems. These services are simple to implement, but they are …