Results 1 to 10 of about 3,708 (115)
Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques. [PDF]
The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy.
Ko Y, Pawana IWAJ, You I.
europepmc +2 more sources
Physically secure and fog-enabled lightweight authentication scheme for WBAN. [PDF]
Wireless Body Area Networks (WBANs) are vital for healthcare, fitness monitoring, and remote patient care by means of combining sensors and wearable technologies for data collection and transmission.
Subramani J +3 more
europepmc +2 more sources
A Novel Key Distribution for Mobile Patient Authentication Inspired by the Federated Learning Concept and Based on the Diffie-Hellman Elliptic Curve. [PDF]
Ensuring secure communication for mobile patients in e-healthcare requires an efficient and robust key distribution mechanism. This study introduces a novel hierarchical key distribution architecture inspired by federated learning (FL), enabling seamless
AbuAlghanam O +4 more
europepmc +2 more sources
An Epistemic Foundation for Authentication Logics (Extended Abstract) [PDF]
While there have been many attempts, going back to BAN logic, to base reasoning about security protocols on epistemic notions, they have not been all that successful. Arguably, this has been due to the particular logics chosen.
Joseph Y. Halpern +2 more
doaj +1 more source
Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks
With increased interest in 6G (6th Generation) cellular networks that can support intelligently small-cell communication will result in effective device-to-device (D2D) communication. High throughput requirement in 5G/6G cellular technology requires each
Adnan Shahid Khan +7 more
doaj +1 more source
Formal security analysis of an IoT mutual authentication protocol [PDF]
Wireless sensor networks (WSNs) are widely used in day to day activities in order to provide users with multiple services such as smart grids, smart homes, industrial internet of things (IoT), agriculture and health-care.
Fariss Meriam +2 more
doaj +1 more source
Medi-Block record: Secure data sharing using block chain technology
With the advances in the era of Artificial intelligence, block chain, cloud computing, big data has the need for secure, decentralized medical record storage and retrieval systems, while cloud storage resolves storage issues but it is difficult to ...
Chaitanya Singh +4 more
doaj +1 more source
With the development in wireless communication and low-power device, users can receive various useful services such as electric vehicle (EV) charging, smart building, and smart home services at anytime and anywhere in smart grid (SG) environments. The SG
SungJin Yu +6 more
doaj +1 more source
Wireless Body Area Network (WBAN) is an important element of future smart healthcare services in smart cities. For this reason, many research works have been undergone in WBAN. The significant research issue in the WBAN environment is Quality of Service (
Abdullahi Abdu Ibrahim
doaj +1 more source
A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally
Koketso Ntshabele +3 more
doaj +1 more source

