Results 1 to 10 of about 3,708 (115)

Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques. [PDF]

open access: yesSensors (Basel)
The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy.
Ko Y, Pawana IWAJ, You I.
europepmc   +2 more sources

Physically secure and fog-enabled lightweight authentication scheme for WBAN. [PDF]

open access: yesSci Rep
Wireless Body Area Networks (WBANs) are vital for healthcare, fitness monitoring, and remote patient care by means of combining sensors and wearable technologies for data collection and transmission.
Subramani J   +3 more
europepmc   +2 more sources

A Novel Key Distribution for Mobile Patient Authentication Inspired by the Federated Learning Concept and Based on the Diffie-Hellman Elliptic Curve. [PDF]

open access: yesSensors (Basel)
Ensuring secure communication for mobile patients in e-healthcare requires an efficient and robust key distribution mechanism. This study introduces a novel hierarchical key distribution architecture inspired by federated learning (FL), enabling seamless
AbuAlghanam O   +4 more
europepmc   +2 more sources

An Epistemic Foundation for Authentication Logics (Extended Abstract) [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2017
While there have been many attempts, going back to BAN logic, to base reasoning about security protocols on epistemic notions, they have not been all that successful. Arguably, this has been due to the particular logics chosen.
Joseph Y. Halpern   +2 more
doaj   +1 more source

Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks

open access: yesIEEE Access, 2022
With increased interest in 6G (6th Generation) cellular networks that can support intelligently small-cell communication will result in effective device-to-device (D2D) communication. High throughput requirement in 5G/6G cellular technology requires each
Adnan Shahid Khan   +7 more
doaj   +1 more source

Formal security analysis of an IoT mutual authentication protocol [PDF]

open access: yesITM Web of Conferences, 2023
Wireless sensor networks (WSNs) are widely used in day to day activities in order to provide users with multiple services such as smart grids, smart homes, industrial internet of things (IoT), agriculture and health-care.
Fariss Meriam   +2 more
doaj   +1 more source

Medi-Block record: Secure data sharing using block chain technology

open access: yesInformatics in Medicine Unlocked, 2021
With the advances in the era of Artificial intelligence, block chain, cloud computing, big data has the need for secure, decentralized medical record storage and retrieval systems, while cloud storage resolves storage issues but it is difficult to ...
Chaitanya Singh   +4 more
doaj   +1 more source

Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment

open access: yesApplied Sciences, 2020
With the development in wireless communication and low-power device, users can receive various useful services such as electric vehicle (EV) charging, smart building, and smart home services at anytime and anywhere in smart grid (SG) environments. The SG
SungJin Yu   +6 more
doaj   +1 more source

Quality of Service‐aware clustered triad layer architecture for critical data transmission in multi‐body area network environment

open access: yesEngineering Reports, 2021
Wireless Body Area Network (WBAN) is an important element of future smart healthcare services in smart cities. For this reason, many research works have been undergone in WBAN. The significant research issue in the WBAN environment is Quality of Service (
Abdullahi Abdu Ibrahim
doaj   +1 more source

A Trusted Security Key Management Server in LoRaWAN: Modelling and Analysis

open access: yesJournal of Sensor and Actuator Networks, 2022
The traditional Long-Range Wide-Area Network (LoRaWAN) uses an Advanced Encryption Standard (AES) 128 bit symmetric key to secure entities and data against several attacks. However, due to the existence of heterogeneous applications, designing a globally
Koketso Ntshabele   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy