Results 1 to 10 of about 3,852 (258)

Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity. [PDF]

open access: yesPLoS ONE, 2022
The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide the mutual authentication and the robust session key agreement is one of the ...
Hyang-Rim Jo   +3 more
doaj   +2 more sources

Group-ID based RFID Mutual Authentication

open access: yesAdvances in Electrical and Computer Engineering, 2013
For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns.
LEE, Y., PARK, Y.
doaj   +3 more sources

Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier

open access: yesJournal of Sensor and Actuator Networks, 2022
Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services.
Abdullah M. Almuhaideb, Huda A. Alghamdi
doaj   +1 more source

Group authentication and key distribution for sensors in wireless body area network

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Wireless body area network can be employed to collect patient’s electronic health data. To guarantee the reliability and confidentiality of the collected data, secure data transmission in wireless body area network is required.
Yong Ding   +4 more
doaj   +1 more source

Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network

open access: yesApplied Sciences, 2020
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices.
Seonghyeon Gong   +3 more
doaj   +1 more source

Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing

open access: yesIEEE Access, 2020
Security analysts have shown that it is possible to compromise the mobile two-factor authentication applications that employ SMS-based authentication. In this paper, we consider that offloading mobile applications to the cloud, which is resource-rich and
Abdelouahid Derhab   +3 more
doaj   +1 more source

Provable Privacy Preserving Authentication Solution for Internet of Things Environment

open access: yesIEEE Access, 2021
The Internet of Things (IoT) has become an important technology which permits different devices and machines to interconnect with each other using heterogeneous networks. The integration of numerous techniques is expected to offer extraordinary growth in
Bander A. Alzahrani, Khalid Mahmood
doaj   +1 more source

Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications

open access: yesSensors, 2018
With wireless sensor networks (WSNs), a driver can access various useful information for convenient driving, such as traffic congestion, emergence, vehicle accidents, and speed.
SungJin Yu   +4 more
doaj   +1 more source

A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs

open access: yesIEEE Access, 2017
Providing efficient anonymous authentication in vehicular ad hoc networks (VANETs) is a challenging issue. Identity-based signature schemes have been used to provide privacy-preserving authentication effectively for VANETs.
Cong Sun   +3 more
doaj   +1 more source

RFID mutual authentication protocols

open access: yesDecision Support Systems, 2011
As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual
RFID European Lab, Paris, France ( host institution )   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy