An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

F Wu, L Xu, S Kumari, X Li, J Shen, KKR Choo… - Journal of Network and …, 2017 - Elsevier
Wireless sensor networks (WSNs) for Internet of Things (IoT) can be deployed in a wide
range of industries such as agriculture and military. However, designing a secure and …

Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications

CM Chen, KH Wang, KH Yeh, B Xiang… - Journal of Ambient …, 2019 - Springer
A secure authenticated key exchange protocol is an essential key to bootstrap a secure
wireless communication. Various research have been conducted to study the efficiency and …

An anonymous ECC-based self-certified key distribution scheme for the smart grid

D Abbasinezhad-Mood… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In the smart grid, the various stakeholders can communicate securely and efficiently only if
they employ a proper key distribution scheme. In recent years, a number of key distribution …

LAKAF: Lightweight authentication and key agreement framework for smart grid network

AA Khan, V Kumar, M Ahmad, S Rana - Journal of Systems Architecture, 2021 - Elsevier
Combination of sustainable resources and expanded developments in vitality utilization
have made new challenges for the traditional grid system. To confront these challenges, the …

Secure and efficient user authentication scheme for multi-gateway wireless sensor networks

J Srinivas, S Mukhopadhyay, D Mishra - Ad Hoc Networks, 2017 - Elsevier
Abstract By utilizing Internet of Things (IoT), the collected information from the sensor nodes
in wireless sensor networks (WSNs) could be provided to the users who are permitted to get …

A survey of authentication schemes in telecare medicine information systems

MU Aslam, A Derhab, K Saleem, H Abbas… - Journal of medical …, 2017 - Springer
E-Healthcare is an emerging field that provides mobility to its users. The protected health
information of the users are stored at a remote server (Telecare Medical Information System) …

A secure three-factor authentication scheme for multi-gateway wireless sensor networks based on elliptic curve cryptography

C Dai, Z Xu - Ad Hoc Networks, 2022 - Elsevier
A secure and efficient mutual authentication and key agreement scheme is critical to the
security of wireless sensor networks (WSNs). Recently, many authentication schemes for …

[HTML][HTML] An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks

CM Chen, B Xiang, TY Wu, KH Wang - Applied Sciences, 2018 - mdpi.com
The advancement of Wireless Body Area Networks (WBAN) have led to significant progress
in medical and health care systems. However, such networks still suffer from major security …

Multi‐tier authentication schemes for fog computing: Architecture, security perspective, and challenges

A Manzoor, MA Shah, HA Khattak… - International Journal …, 2022 - Wiley Online Library
Fog computing has revolutionized the computing domain by enabling resource sharing,
such as online storage, and providing applications and software as services in near vicinity …

Provably secure escrow-less Chebyshev chaotic map-based key agreement protocol for vehicle to grid connections with privacy protection

D Abbasinezhad-Mood, A Ostad-Sharif… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Security and privacy concerns necessitate the careful management of shared keys in the
vehicle to grid (V2G) networks. To do so, in recent years, several interesting key agreement …