Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity. [PDF]
The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide the mutual authentication and the robust session key agreement is one of the ...
Hyang-Rim Jo +3 more
doaj +2 more sources
Group-ID based RFID Mutual Authentication
For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns.
LEE, Y., PARK, Y.
doaj +3 more sources
Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier
Telecare medical information system (TMIS) is a technology used in a wireless body area network (WBAN), which has a crucial role in healthcare services.
Abdullah M. Almuhaideb, Huda A. Alghamdi
doaj +1 more source
Group authentication and key distribution for sensors in wireless body area network
Wireless body area network can be employed to collect patient’s electronic health data. To guarantee the reliability and confidentiality of the collected data, secure data transmission in wireless body area network is required.
Yong Ding +4 more
doaj +1 more source
Secure Secondary Authentication Framework for Efficient Mutual Authentication on a 5G Data Network
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices.
Seonghyeon Gong +3 more
doaj +1 more source
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing
Security analysts have shown that it is possible to compromise the mobile two-factor authentication applications that employ SMS-based authentication. In this paper, we consider that offloading mobile applications to the cloud, which is resource-rich and
Abdelouahid Derhab +3 more
doaj +1 more source
Provable Privacy Preserving Authentication Solution for Internet of Things Environment
The Internet of Things (IoT) has become an important technology which permits different devices and machines to interconnect with each other using heterogeneous networks. The integration of numerous techniques is expected to offer extraordinary growth in
Bander A. Alzahrani, Khalid Mahmood
doaj +1 more source
Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications
With wireless sensor networks (WSNs), a driver can access various useful information for convenient driving, such as traffic congestion, emergence, vehicle accidents, and speed.
SungJin Yu +4 more
doaj +1 more source
A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs
Providing efficient anonymous authentication in vehicular ad hoc networks (VANETs) is a challenging issue. Identity-based signature schemes have been used to provide privacy-preserving authentication effectively for VANETs.
Cong Sun +3 more
doaj +1 more source
RFID mutual authentication protocols
As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual
RFID European Lab, Paris, France ( host institution ) +1 more
openaire +2 more sources

