Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design
The fast development of mobile networks and compact mobile devices bring attention to the users for wireless mobile communication. But providing security and protecting the privacy of users are the main challenges of wireless mobile communication ...
T Senthil Kumar, S Prabakaran
doaj +1 more source
SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge
Security is a crucial factor for the appropriate functioning of fog/edge computing. Secured mutual authentication in networks has become key demand as per the current security standard.
Mayuresh Sunil Pardeshi, Shyan-Ming Yuan
doaj +1 more source
Efficient Mutual Data Authentication Using Manually Authenticated Strings [PDF]
Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short range wireless communication. All such key exchange protocols employ data authentication as an unavoidable subtask.
Sven Laur, Kaisa Nyberg
openaire +1 more source
RFID-MA XTEA: Cost-Effective RFID-Mutual Authentication Design Using XTEA Security on FPGA Platform [PDF]
RFID systems are one of the essential technologies and used many diverse applications. The security and privacy are the primary concern in RFID systems which are overcome by using suitable authentication protocols.
R. Anusha, V. Veena Devi Shastrimath
doaj +1 more source
Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments
Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users.
JoonYoung Lee +4 more
doaj +1 more source
Cryptoanalysis on a Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System
The interconnecting of the biomedical sensors (in healthcare system) with cloud for the internet-of-medical-things (IoMT) technology has great potential to ameliorate people’s living conditions.
Ronghua Xu, Qiaochuan Ren
doaj +1 more source
A study on lightweight mutual authentication for radio-frequency identification medical device
Recently, radio-frequency identification (RFID) technology has been applied to various industrial fields. It is used for various health-care purposes such as patient information management and health management, thereby providing convenience for both ...
Yong-Woon Hwang, Im-Yeong Lee
doaj +1 more source
Universally Composable RFID Mutual Authentication
Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols ...
SU, Chunhua +4 more
openaire +3 more sources
New key management scheme lattice-based for clustered wireless sensor networks
Aiming at the quantum algorithm which can solve the problem of large integer decomposition and discrete logarithm in polynomial time, an anti-quantum computing key management scheme for clustered sensor networks is proposed in this paper.
Jiang Zhang, Qi Liu
doaj
Mutual authentication protocols for RFID systems [PDF]
With the availability of low-cost radio frequency identification (RFID) tags, security becomes an increasing concern. However, such tags do not permit complex cryptographic functions due to their computational, communications, and storage limitations. In this paper, we investigate the security issues and requirements of RFID systems, and propose ultra ...
Ashrar A. Omer +2 more
openaire +1 more source

