Securing public safety communications on commercial and tactical 5G networks: A survey and future research directions

J Suomalainen, J Julku, M Vehkaperä… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The forthcoming communication networks for public safety authorities rely on the fifth
generation (5G) of mobile networking technologies. Police officers, paramedics, border …

Computation-transferable authenticated key agreement protocol for smart healthcare

W Wang, H Huang, F Xiao, Q Li, L Xue… - Journal of Systems …, 2021 - Elsevier
Smart healthcare plays an important role in contemporary society while its security and
privacy issues remain inevitable challenges. Authenticated key agreement (AKA) …

A sidechain-based decentralized authentication scheme via optimized two-way peg protocol for smart community

M Li, H Tang, AR Hussein… - IEEE Open Journal of the …, 2020 - ieeexplore.ieee.org
In this work, we propose a novel sidechain structure via an optimized two-way peg protocol
for device authentication in the smart community in order to overcome the limitations of …

An efficient and certificateless conditional privacy-preserving authentication and key agreement scheme for smart healthcare

Y Hu, C Huang, H Cheng - Computer Communications, 2024 - Elsevier
Smart healthcare overcomes the limitations of time and space, allowing users to access
medical and health services anywhere and anytime, thus improving the quality and …

Leakage-resilient authenticated key exchange for edge artificial intelligence

J Zhang, F Zhang, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge Artificial Intelligence (AI) is a timely complement of cloud-based AI. By introducing
intelligence to the edge, it alleviates privacy concerns of streaming and storing data to the …

Identity-based identity-concealed authenticated key exchange

H Lian, T Pan, H Wang, Y Zhao - … , Darmstadt, Germany, October 4–8, 2021 …, 2021 - Springer
Identity-based authenticated key exchange (ID-AKE) allows two parties (whose identities are
just their public keys) to agree on a shared session key over open channels. At ESORICS …

Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications

H Sun, C Li, J Zhang, S Liang, W Huang - Sensors, 2023 - mdpi.com
Internet of Things (IoT) applications have been increasingly developed. Authenticated key
agreement (AKA) plays an essential role in secure communication in IoT applications …

Strongly Secure Identity-based Authenticated Key Agreement Protocol with Identity Concealment for Secure Communication in 5G Network

H Lian, B Kang, L Yang - IEEE Access, 2024 - ieeexplore.ieee.org
With the rocketing progress of the fifth generation (5G) mobile communication technology,
identity-based authenticated key agreement (ID-AKA) protocol performs an increasingly …

Identity-Based Key Agreement for Blockchain-Powered Intelligent Edge

J Zhang, F Zhang - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the new paradigm of blockchain-powered intelligent edge, the key agreement is a
significant problem that has not been extensively studied so far. Existing key agreement …

Leakage-resilient and lightweight authenticated key exchange for e-health

W Zeng, J Zhang - 2020 6th International Conference on …, 2020 - ieeexplore.ieee.org
E-Health applications generally involve human users' privacy information such as identity
and medical data. To protect these data, authenticated key exchange (AKE) protocols are …