BP-AKAA: blockchain-enforced privacy-preserving authentication and key agreement and access control for IIoT

S Liu, L Chen, H Yu, S Gao, H Fang - Journal of Information Security and …, 2023 - Elsevier
Abstract The Industrial Internet of Things (IIoT) links multiple subnets to accomplish more
real-time, efficient, and high-class production. Authentication is an essential prerequisite for …

[HTML][HTML] State-of-the-Art Authentication and Verification Schemes in VANETs: A Survey

S Mazhar, A Rakib, L Pan, F Jiang, A Anwar… - Vehicular …, 2024 - Elsevier
ABSTRACT Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile Ad-Hoc Networks
(MANETs), are wire-less networks formed around moving vehicles, enabling communication …

Security aspects of device-to-device (D2D) networks in wireless communication: a comprehensive survey

A Khan, R Das - Telecommunication Systems, 2022 - Springer
Very soon, trillions of wireless gadgets will be linked to billions of people, resulting in an
overloaded spectrum. Device-to-device (D2D) wireless communication offers a new …

[PDF][PDF] An efficient aggregate signature scheme for healthcare wireless sensor networks

JN Chen, YP Zhou, ZJ Huang, TY Wu, FM Zou… - J. Netw. Intell, 2021 - bit.nkust.edu.tw
In healthcare wireless sensor networks, there are a large number of sensors, which need to
transmit a lot of information in real time. The aggregate signature scheme combines a great …

Lightweight Authentication Scheme for IoT based E-Healthcare Service Communication

MM Salim, LT Yang, JH Park - IEEE Journal of Biomedical and …, 2023 - ieeexplore.ieee.org
Remote Patient Monitoring (RPM) using Electronic Healthcare (E-health) is a growing
phenomenon enabling doctors predict patient health such as possible cardiac arrests from …

Device-to-device group authentication compatible with 5G AKA protocol

A Braeken - Computer Networks, 2021 - Elsevier
Abstract Device-to-device (D2D) communication in 5G can offload large amounts of data
from the core network and offer smaller delays in communication, making advantage of the …

Securing real-time video surveillance data in vehicular cloud computing: A survey

MS Alsayfi, MY Dahab, FE Eassa, R Salama… - IEEE …, 2022 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have received a great amount of interest, especially in
wireless communications technology. In VANETs, vehicles are equipped with various …

Efficient authentication for Internet of Things devices in information management systems

X Wu, F Ren, Y Li, Z Chen, X Tao - … and Mobile Computing, 2021 - Wiley Online Library
With the rapid development of the Internet of Things (IoT) technology, it has been widely
used in various fields. IoT device as an information collection unit can be built into an …

Enhancing privacy in cyber–physical systems: An efficient blockchain-assisted data-sharing scheme with deniability

Y Xu, Z Peng, C Zhang, G Wang, H Wang… - Journal of Systems …, 2024 - Elsevier
Abstract The data in Cyber–Physical Systems (CPSs) is currently undergoing an explosive
surge. Blockchain-based CPS exhibit enhancements in security, fault tolerance, and trust for …

A secure Device-to-Device communication scheme for massive Machine Type Communication

P Roychoudhury, B Roychoudhury, DK Saikia - Computers & Security, 2021 - Elsevier
Abstract Massive Machine Type Communication (mMTC) services aims to provide universal
connectivity to thousands of low-power, low-cost devices with the support of 5G cellular …