A Lightweight Stochastic Blockchain for IoT Data Integrity in Wireless Channels
Trustworthy validators selection is crucial as validators determine whether a block should be added to its chain. In this article, we proposed a novel confidence score-based lightweight stochastic blockchain for wireless Internet of Things (IoT) systems.
Sushila Dhaka +3 more
doaj +1 more source
Authentication of RSA via BAN logic
Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems.
Salah A. K. Albermany +1 more
doaj +1 more source
Design of Secure Mutual Authentication Scheme for Metaverse Environments Using Blockchain
During the COVID-19 pandemic, engagement in various remote activities such as online education and meetings has increased. However, since the conventional online environments typically provide simple streaming services using cameras and microphones ...
Jongseok Ryu +4 more
doaj +1 more source
Design of a Logistics System with Privacy and Lightweight Verification
Presently, E-commerce has developed rapidly as a result of many services and applications integrating e-commerce technologies offered online. Buyers can buy goods online and sellers can then deliver the goods to them.
Chin-Ling Chen +4 more
doaj +1 more source
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security.
Man Chun Chow, Maode Ma
doaj +1 more source
A Secure Key Aggregate Searchable Encryption with Multi Delegation in Cloud Data Sharing Service
As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention.
JoonYoung Lee +5 more
doaj +1 more source
A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users.
JiHyeon Oh +5 more
doaj +1 more source
Efficient Mobile RFID Authentication Protocol for Smart Logistics Targets Tracking
Target tracking is one of the problems existing in the supply chain management. The use of radio frequency identification (RFID) in target tracking helps improve the monitoring accuracy and status visibility of the tracked target. For mobile RFID system,
Cong Xu, Wenxue Wei, Shuangshuang Zheng
doaj +1 more source
A Secure LEACH-PRO Protocol Based on Blockchain
Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs ...
Ghada Sultan Aljumaie, Wajdi Alhakami
doaj +1 more source
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity
Recently, many dynamic ID based remote user authentication schemes using smart card have been proposed to improve the security in multiple servers architecture authentication systems.
Huawei Wang +3 more
doaj +1 more source

