[HTML][HTML] Secure and privacy-preserving authentication scheme using decentralized identifier in metaverse environment

M Kim, J Oh, S Son, Y Park, J Kim, Y Park - Electronics, 2023 - mdpi.com
The metaverse provides a virtual world with many social activities that parallel the real world.
As the metaverse attracts more attention, the importance of security and privacy preservation …

Novel ECC-based RFID mutual authentication protocol for emerging IoT applications

S Gabsi, Y Kortli, V Beroulle, Y Kieffer, A Alasiry… - IEEE …, 2021 - ieeexplore.ieee.org
The implementation of RFID technology has globally impacted several industries and this
revolution has improved the aspects of service delivery in many sectors, such as logistics …

[HTML][HTML] ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags

M Shariq, K Singh, C Lal, M Conti, T Khan - Computer Networks, 2022 - Elsevier
Abstract Internet of Things (IoT) technologies rapidly evolve and are used in many real-life
applications. One of the core technologies used in various IoT applications is Radio …

An authentication protocol for next generation of constrained Iot systems

S Rostampour, N Bagheri, Y Bendavid… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
With the exponential growth of connected Internet of Things (IoT) devices around the world,
security protection and privacy preservation have risen to the forefront of design and …

RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing

M Safkhani, C Camara, P Peris-Lopez… - Vehicular …, 2021 - Elsevier
RSEAP is a recently proposed RFID based authentication protocol for vehicular cloud
computing whose authors claimed to be secure and efficient. In this article, we challenge …

RESEAP: An ECC-based authentication and key agreement scheme for IoT applications

M Safkhani, N Bagheri, S Kumari, H Tavakoli… - IEEE …, 2020 - ieeexplore.ieee.org
Although the Internet of Things (IoT) provides many benefits for our life but it also raises
many security threats. The main risk is the security of the transferred data comprising very …

LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems

H Ali, I Ahmed - Computers & Security, 2024 - Elsevier
Fog computing is a new computing model with limited resources located near the Internet of
Things (IoT) devices to provide low transmission delay, mobility, and location awareness …

An Enhanced RFID‐Based Authentication Protocol using PUF for Vehicular Cloud Computing

V Kumar, R Kumar, S Jangirala… - Security and …, 2022 - Wiley Online Library
RFID (radio frequency identification) is an Internet of Things (IoT) enabling technology. All
physical devices can be connected to the Internet of Things thanks to RFID. When RFID is …

URASP: An ultralightweight RFID authentication scheme using permutation operation

M Shariq, K Singh, PK Maurya, A Ahmadian… - Peer-to-Peer Networking …, 2021 - Springer
Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a
contactless technology that has become more and more promising for automatic …

SF‐LAP: Secure M2M Communication in IIoT with a Single‐Factor Lightweight Authentication Protocol

K Shahzad, M Alam, N Javaid, A Waheed… - Journal of …, 2022 - Wiley Online Library
Machine‐to‐machine communication allows smart devices like sensors, actuators, networks,
gateways, and other controllers to communicate with one another. The industrial Internet of …