Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

Anonymous authentication for wireless body area networks with provable security

D He, S Zeadally, N Kumar, JH Lee - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
Advances in wireless communications, embedded systems, and integrated circuit
technologies have enabled the wireless body area network (WBAN) to become a promising …

A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing

X Jia, D He, N Kumar, KKR Choo - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
Mobile edge computing (MEC) allows one to overcome a number of limitations inherent in
cloud computing, although achieving the broad range of security requirements in MEC …

A lightweight multi-layer authentication protocol for wireless body area networks

J Shen, S Chang, J Shen, Q Liu, X Sun - Future generation computer …, 2018 - Elsevier
Nowadays, the technology of Internet of Things (IoT) is getting more and more important
which brings a lot of convenience to people's life and city's development. As a key …

An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security

H Debiao, C Jianhua, H Jin - Information Fusion, 2012 - Elsevier
Recently, lots of remote user authentication schemes are implemented on elliptic curve
cryptosystem (ECC) to reduce the computation loads for mobile devices. However, most of …

A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network

M Kumar, S Chand - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Recent advancements in ubiquitous technologies, such as an intelligible sensor, wireless
communication, internet of things, and cloud computing have enabled the wearable devices …

A secure mutual authentication protocol for IoT environment

PK Panda, S Chattopadhyay - Journal of Reliable Intelligent Environments, 2020 - Springer
Rapid development in the field of Internet of Things (IoT) has made it possible to connect
many embedded devices to the internet for the sharing of data. Since, the embedded device …

A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem

SKH Islam, GP Biswas - Journal of Systems and Software, 2011 - Elsevier
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic
curve cryptography for the users of mobile devices. We have analyzed the security aspects …

Remote authentication schemes for wireless body area networks based on the Internet of Things

MES Saeed, QY Liu, G Tian, B Gao… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is a new technology which offers enormous applications that make
people's lives more convenient and enhances cities' development. In particular, smart …

Design of provably secure authentication protocol for edge-centric maritime transportation system

K Mahmood, S Shamshad, MF Ayub… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime
Transportation Systems (MTS). Though, it becomes challenging for the centralized cloud …