A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

PM Rao, BD Deebak - Ad Hoc Networks, 2023 - Elsevier
Critical infrastructures such as healthcare, intelligent transportation, and home automation
adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The …

A robust biometrics based three-factor authentication scheme for global mobility networks in smart city

X Li, J Niu, S Kumari, F Wu, KKR Choo - Future Generation Computer …, 2018 - Elsevier
Smart city is a development tendency of future city, which improves almost all aspects of
quality of urban residents' life by adopting Information and Communication Technology. In …

Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks

P Gope, T Hwang - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
User authentication is an imperative security mechanism for recognizing legal roaming
users. However, designing an expeditious anonymous-user authentication scheme in the …

A privacy enhanced authentication scheme for telecare medical information systems

Q Jiang, J Ma, Z Ma, G Li - Journal of medical systems, 2013 - Springer
The telecare medical information system (TMIS) aims to establish telecare services and
enable the public to access medical services or medical information at remote sites …

An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks

Q Jiang, J Ma, G Li, L Yang - Wireless personal communications, 2013 - Springer
Global mobility network (GLOMONET) provides global roaming service to ensure ubiquitous
connectivity for users traveling from one network to another. It is very crucial not only to …

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks

F Wu, L Xu, S Kumari, X Li, AK Das… - Security and …, 2016 - Wiley Online Library
Ubiquitous networks support the roaming service for mobile communication devices. The
mobile user can use the services in the foreign network with the help of the home network …

Design of an anonymity-preserving group formation based authentication protocol in global mobility networks

S Banerjee, V Odelu, AK Das, S Chattopadhyay… - IEEE …, 2018 - ieeexplore.ieee.org
Remote user authentication without compromising user anonymity is an emerging area in
the last few years. In this paper, we propose a new anonymity preserving mobile user …

Lightweight and provably secure user authentication with anonymity for the global mobility network

C Chen, D He, S Chan, J Bu, Y Gao… - International Journal of …, 2011 - Wiley Online Library
Seamless roaming in the global mobility network (GLOMONET) is highly desirable for
mobile users, although their proper authentication is challenging. This is because not only …

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security

MS Farash, SA Chaudhry, M Heydari… - International Journal …, 2017 - Wiley Online Library
Ubiquitous networks provide roaming service for mobile nodes enabling them to use the
services extended by their home networks in a foreign network. A mutual authentication …

An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks

P Gope, T Hwang - Journal of Network and Computer Applications, 2016 - Elsevier
User authentication is an imperative mechani sm, especially for recognizing legal roaming
users in global mobility networks (GLOMONET). Therefore, it is highly desirable to have a …