Fault-tolerant and scalable key management for smart grid

D Wu, C Zhou - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
In this paper, we study the problem of secure key management for smart grid. Since existing
key management schemes are not suitable for deployment in smart grid, in this paper, we …

A proxy signature-based swarm drone authentication with leader selection in 5G networks

MA Abdel-Malek, K Akkaya, A Bhuyan… - IEEE Access, 2022 - ieeexplore.ieee.org
Drones are imperative for the 5G architecture as a mobile source to expand network
coverage and support seamless services, particularly through enabling device-to-device …

An efficient mobile authentication scheme for wireless networks

C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
This paper proposes an efficient authentication scheme, which is suitable for low-power
mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to …

On the IEEE 802.11 i security: a denial‐of‐service perspective

R Singh, TP Sharma - Security and Communication Networks, 2015 - Wiley Online Library
The IEEE 802.11 i standard provides authentication and security at the Medium Access
Control layer in wireless local area networks (WLANs). It involves an authentication process …

Time-bound anonymous authentication for roaming networks

JK Liu, CK Chu, SSM Chow, X Huang… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
We propose an anonymous authentication protocol that supports time-bound credentials for
an efficient revocation. It is especially suitable for large-scale network in roaming scenario …

Detecting and Reducing the Denial of Service attacks in WLANs

R Singh, TP Sharma - 2011 World Congress on Information and …, 2011 - ieeexplore.ieee.org
Wireless LANs are susceptible to Denial of Service (DoS) attacks. None of the existing
wireless security protocols considers protection against them. We propose a novel scheme …

A proxy signature-based drone authentication in 5G D2D networks

MA Abdel-Malek, K Akkaya, A Bhuyan… - 2021 IEEE 93rd …, 2021 - ieeexplore.ieee.org
5G is the beginning of a new era in cellular communication, bringing up a highly connected
network with the incorporation of the Internet of Things (IoT). To flexibly operate all the IoT …

An anonymous and self-verified mobile authentication with authenticated key agreement for large-scale wireless networks

CC Chang, HC Tsai - IEEE Transactions on Wireless …, 2010 - ieeexplore.ieee.org
Increasing numbers of mobile users are being allowed to use wireless networks, and
universal access is being promoted. In the absent of a single, trusted authentication server, it …

Mobile privacy in wireless networks-revisited

C Tang, DO Wu - IEEE Transactions on Wireless …, 2008 - ieeexplore.ieee.org
With the widespread use of mobile devices, the privacy of mobile location information
becomes an important issue. In this paper, we present the requirements on protecting …

Secure delegation-based authentication protocol for wireless roaming service

JL Tsai, NW Lo, TC Wu - IEEE Communications Letters, 2012 - ieeexplore.ieee.org
Portable devices, with wireless communication capability, are used widely in everyday life.
Preventing personal sensitive information from being revealed to an adversary through …