Trusted authority based session key agreement and authentication algorithm for smart grid networks

VO Nyangaresi, M Abd‐Elnaby… - Transactions on …, 2022 - Wiley Online Library
The information exchanged over the smart grid networks is sensitive and private. As such,
proper mechanisms must be put in place to protect these messages from security and …

Provably Secure Pseudonyms based Authentication Protocol for Wearable Ubiquitous Computing Environment

VO Nyangaresi - 2022 International Conference on Inventive …, 2022 - ieeexplore.ieee.org
Wireless body area networks and medical servers exchange sensitive and private patient
data that should be protected from malicious entities. To achieve this, numerous security …

Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things

MA Al Sibahee, VO Nyangaresi, J Ma… - … Conference on Internet …, 2021 - Springer
To ensure secure access to the data held in internet of things, many lightweight
authentication schemes have been developed using approaches such as symmetric …

Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment

KAA Mutlaq, VO Nyangaresi, MA Omar… - … Conference on Applied …, 2022 - Springer
The traditional power grid systems are being replaced with smart grids so as to offer the
required levels of flexibility, reliability, efficiency and dynamic power adjustments. However …

Provably secure session key agreement protocol for unmanned aerial vehicles packet exchanges

VO Nyangaresi, A Ibrahim… - 2021 International …, 2021 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) convey secret data that belongs to the military, individual
or organizations. As such, privacy and security protection of this data is critical. To …

Certificate based authentication scheme for smart homes

VO Nyangaresi, SO Ogundoyin - 2021 3rd Global Power …, 2021 - ieeexplore.ieee.org
Smart home networks convey sensitive user private data that requires adequate protection.
However, lack of standard security and privacy architectures for smart meters or failure of …

Masked symmetric key encrypted verification codes for secure authentication in smart grid networks

VO Nyangaresi - 2022 4th Global Power, Energy and …, 2022 - ieeexplore.ieee.org
Although many smart grid authentication protocols have been presented in literature,
majority of them remain susceptible to numerous attacks. In addition, some of these …

Energy efficient dynamic symmetric key based protocol for secure traffic exchanges in smart homes

VO Nyangaresi, ZA Abduljabbar, KAA Mutlaq, J Ma… - Applied Sciences, 2022 - mdpi.com
Highly sensitive information about people's social life and daily activities flows in smart
home networks. As such, if attackers can manage to capture or even eavesdrop on this …

Authentication and key agreement protocol for secure traffic signaling in 5G networks

VO Nyangaresi, ZA Abduljabbar… - 2021 IEEE 2nd …, 2021 - ieeexplore.ieee.org
Security and privacy issues in 5G networks center around traceability, de-synchronization,
impersonation, man-in-the-middle, linkability, message replays among others. Although 5G …

Towards security and privacy preservation in 5G networks

VO Nyangaresi, ZA Abduljabbar… - 2021 29th …, 2021 - ieeexplore.ieee.org
The Fifth Generation (5G) networks support various service delivery models such as Device
to Device (D2D) communication, Unmanned Aerial Vehicles (UAVs) and Vehicular Ad Hoc …