Timed automata as a formalism for expressing security: A survey on theory and practice

J Arcile, É André - ACM Computing Surveys, 2022 - dl.acm.org
Timed automata are a common formalism for the verification of concurrent systems subject to
timing constraints. They extend finite-state automata with clocks, that constrain the system …

Formal security analysis of LoRaWAN

M Eldefrawy, I Butun, N Pereira, M Gidlund - Computer Networks, 2019 - Elsevier
Abstract Recent Low Power Wide Area Networks (LPWAN) protocols are receiving
increased attention from industry and academia to offer accessibility for Internet of Things …

[HTML][HTML] The use of iot-based wearable devices to ensure secure lightweight payments in fintech applications

S Bojjagani, NR Seelam, NK Sharma, R Uyyala… - Journal of King Saud …, 2023 - Elsevier
Daily digital payments in Financial Technology (FinTech) are growing exponentially. A huge
demand is for developing secure, lightweight cryptography protocols for wearable IoT-based …

An efficient key management and multi-layered security framework for SCADA systems

D Upadhyay, M Zaman, R Joshi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) networks play a vital role in industrial
control systems. Industrial organizations perform operations remotely through SCADA …

Insider attack protection: Lightweight password-based authentication techniques using ECC

S Rajamanickam, S Vollala, R Amin… - IEEE Systems …, 2019 - ieeexplore.ieee.org
The radical advancement in web services has drawn more attention toward intensifying the
security of numerous applications that interact and serve the Internet users. In order to …

Smart keys for cyber-cars: Secure smartphone-based NFC-enabled car immobilizer

C Busold, A Taha, C Wachsmann… - Proceedings of the third …, 2013 - dl.acm.org
Smartphones have become very popular and versatile devices. An emerging trend is the
integration of smartphones into automotive systems and applications, particularly access …

eSIM‐Based Authentication Protocol for UAV Remote Identification

A Shoufan, C Yeob Yeun, B Taha - … and Privacy in the Internet of …, 2021 - Wiley Online Library
This chapter addresses the authentic communication of drones' remote identification. First, it
investigates the security of drones in the context of unmanned traffic management systems …

A secure end‐to‐end SMS‐based mobile banking protocol

S Bojjagani, VN Sastry - International journal of communication …, 2017 - Wiley Online Library
Short message service (SMS) provides a wide channel of communication for banking in
mobile commerce and mobile payment. The transmission of SMS is not secure in the …

Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET

R Madhusudhan - Peer-to-Peer Networking and Applications, 2020 - Springer
Abstract In GLObal MObile NETwork (GLOMONET), it is essential to authenticate and
provide secure communication between a user, foreign agent, and the home agent using …

Secure lightweight ECC-based protocol for multi-agent IoT systems

H Hasan, T Salah, D Shehada… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
The rapid increase of connected devices and the major advances in information and
communication technologies have led to great emergence in the Internet of Things (IoT). IoT …