Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems

W Liang, L Xiao, K Zhang, M Tang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Blockchain technology is rapidly changing the transaction behavior and efficiency of
businesses in recent years. Data privacy and system reliability are critical issues that is …

A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles

Z Xu, W Liang, KC Li, J Xu, H Jin - Journal of Parallel and Distributed …, 2021 - Elsevier
A fundamental layer of smart cities, the Internet of Vehicles (IoV) can significantly improve
transportation efficiency, reduce energy consumption, and traffic accidents. However …

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

X Li, J Niu, S Kumari, F Wu, AK Sangaiah… - Journal of Network and …, 2018 - Elsevier
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

X Li, MH Ibrahim, S Kumari, AK Sangaiah, V Gupta… - Computer Networks, 2017 - Elsevier
Wireless body area networks (WBANs) are used to collect and exchange vital and sensitive
information about the physical conditions of patients. Due to the openness and mobility of …

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

F Wu, X Li, AK Sangaiah, L Xu, S Kumari, L Wu… - Future Generation …, 2018 - Elsevier
Abstract Wireless Sensor Network (WSN) is a very important part of Internet of Things (IoT),
especially in e-healthcare applications. Among them, wireless medical sensor networks …

A mutual security authentication method for RFID-PUF circuit based on deep learning

W Liang, S Xie, D Zhang, X Li, KC Li - ACM Transactions on Internet …, 2021 - dl.acm.org
The Industrial Internet of Things (IIoT) is designed to refine and optimize the process
controls, thereby leveraging improvements in economic benefits, such as efficiency and …

A lightweight privacy-preserving authentication protocol for VANETs

X Li, T Liu, MS Obaidat, F Wu… - IEEE Systems …, 2020 - ieeexplore.ieee.org
With the emergence of the concept of smart city and the increase of vehicles, the vehicular
ad-hoc network (VANET) is widely accepted for the communication of vehicles to get …

Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment

S Chatterjee, S Roy, AK Das… - … on Dependable and …, 2016 - ieeexplore.ieee.org
Multi-server environment is the most common scenario for a large number of enterprise
class applications. In this environment, user registration at each server is not recommended …

A novel three-factor authentication protocol for wireless sensor networks with IoT notion

F Wu, X Li, L Xu, P Vijayakumar… - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
As an important topic of IoT, wireless sensor network (WSN) data transmission is popular
nowadays. It is widely accepted that the wireless channel is hazard, and multifactor …

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo… - Journal of Network and …, 2017 - Elsevier
Wireless sensor networks (WSNs) for Internet of Things (IoT) can be deployed in a wide
range of industries such as agriculture and military. However, designing a secure and …