An end-to-end secure key management protocol for e-health applications

MR Abdmeziem, D Tandjaoui - Computers & Electrical Engineering, 2015 - Elsevier
Key distribution is required to secure e-health applications in the context of Internet of Things
(IoT). However, resources constraints in IoT make these applications unable to run existing …

Lightweight and provably secure user authentication with anonymity for the global mobility network

C Chen, D He, S Chan, J Bu, Y Gao… - International Journal of …, 2011 - Wiley Online Library
Seamless roaming in the global mobility network (GLOMONET) is highly desirable for
mobile users, although their proper authentication is challenging. This is because not only …

A review of automated formal verification of ad hoc routing protocols for wireless sensor networks

Z Chen, D Zhang, R Zhu, Y Ma, P Yin, F Xie - Sensor Letters, 2013 - ingentaconnect.com
This paper surveys how formal verification can be used to prove the correctness of ad hoc
routing protocols, which are fundamental infrastructure of wireless sensor networks. The …

A secure IoT-based micro-payment protocol for wearable devices

S Bojjagani, PVV Rao, DR Vemula, BR Reddy… - Peer-to-Peer Networking …, 2022 - Springer
Wearable devices are parts of the essential cost of goods sold (COGS) in the wheel of the
Internet of things (IoT), contributing to a potential impact in the finance and banking sectors …

A secure end‐to‐end SMS‐based mobile banking protocol

S Bojjagani, VN Sastry - International journal of communication …, 2017 - Wiley Online Library
Short message service (SMS) provides a wide channel of communication for banking in
mobile commerce and mobile payment. The transmission of SMS is not secure in the …

An enhanced two-factor user authentication in wireless sensor networks

JJ Yuan - Telecommunication Systems, 2014 - Springer
Since wireless sensor networks (WSN) are often deployed in an unattended environment
and sensor nodes are equipped with limited computing power modules, user authentication …

A semantic analysis of key management protocols for wireless sensor networks

D Macedonio, M Merro - Science of Computer Programming, 2014 - Elsevier
Gorrieri and Martinelli's timed Generalized Non-Deducibility on Compositions (tGNDC)
schema is a well-known general framework for the formal verification of security protocols in …

Model checking ad hoc network routing protocols: ARAN vs. endairA

D Benetti, M Merro, L Vigano - 2010 8th IEEE International …, 2010 - ieeexplore.ieee.org
Several different secure routing protocols have been proposed for determining the
appropriate paths on which data should be transmitted in ad hoc networks. In this paper, we …

A secure and efficient password‐authenticated group key exchange protocol for mobile ad hoc networks

D He, C Chen, M Ma, S Chan… - International Journal of …, 2013 - Wiley Online Library
Password‐authenticated group key exchange protocols enable communication parties to
establish a common secret key (a session key) by only using short secret passwords. Such …

Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems

S Bojjagani, D Brabin, K Kumar, NK Sharma, U Batta - Computing, 2024 - Springer
The smart healthcare system advancements have introduced the Internet of Things,
enabling technologies to improve the quality of medical services. The main idea of these …