Results 11 to 20 of about 3,852 (258)

Security and Privacy enforced wireless mobile communication using PI-MAKA protocol design

open access: yesMeasurement + Control, 2019
The fast development of mobile networks and compact mobile devices bring attention to the users for wireless mobile communication. But providing security and protecting the privacy of users are the main challenges of wireless mobile communication ...
T Senthil Kumar, S Prabakaran
doaj   +1 more source

SMAP Fog/Edge: A Secure Mutual Authentication Protocol for Fog/Edge

open access: yesIEEE Access, 2019
Security is a crucial factor for the appropriate functioning of fog/edge computing. Secured mutual authentication in networks has become key demand as per the current security standard.
Mayuresh Sunil Pardeshi, Shyan-Ming Yuan
doaj   +1 more source

Efficient Mutual Data Authentication Using Manually Authenticated Strings [PDF]

open access: yes, 2006
Solutions for an easy and secure setup of a wireless connection between two devices are urgently needed for WLAN, Wireless USB, Bluetooth and similar standards for short range wireless communication. All such key exchange protocols employ data authentication as an unavoidable subtask.
Sven Laur, Kaisa Nyberg
openaire   +1 more source

RFID-MA XTEA: Cost-Effective RFID-Mutual Authentication Design Using XTEA Security on FPGA Platform [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
RFID systems are one of the essential technologies and used many diverse applications. The security and privacy are the primary concern in RFID systems which are overcome by using suitable authentication protocols.
R. Anusha, V. Veena Devi Shastrimath
doaj   +1 more source

Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments

open access: yesSensors, 2019
Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users.
JoonYoung Lee   +4 more
doaj   +1 more source

Cryptoanalysis on a Cloud-Centric Internet-of-Medical-Things-Enabled Smart Healthcare System

open access: yesIEEE Access, 2022
The interconnecting of the biomedical sensors (in healthcare system) with cloud for the internet-of-medical-things (IoMT) technology has great potential to ameliorate people’s living conditions.
Ronghua Xu, Qiaochuan Ren
doaj   +1 more source

A study on lightweight mutual authentication for radio-frequency identification medical device

open access: yesInternational Journal of Engineering Business Management, 2018
Recently, radio-frequency identification (RFID) technology has been applied to various industrial fields. It is used for various health-care purposes such as patient information management and health management, thereby providing convenience for both ...
Yong-Woon Hwang, Im-Yeong Lee
doaj   +1 more source

Universally Composable RFID Mutual Authentication

open access: yesIEEE Transactions on Dependable and Secure Computing, 2015
Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols ...
SU, Chunhua   +4 more
openaire   +3 more sources

New key management scheme lattice-based for clustered wireless sensor networks

open access: yesPLoS ONE, 2023
Aiming at the quantum algorithm which can solve the problem of large integer decomposition and discrete logarithm in polynomial time, an anti-quantum computing key management scheme for clustered sensor networks is proposed in this paper.
Jiang Zhang, Qi Liu
doaj  

Mutual authentication protocols for RFID systems [PDF]

open access: yesInternational Journal of Automation and Computing, 2008
With the availability of low-cost radio frequency identification (RFID) tags, security becomes an increasing concern. However, such tags do not permit complex cryptographic functions due to their computational, communications, and storage limitations. In this paper, we investigate the security issues and requirements of RFID systems, and propose ultra ...
Ashrar A. Omer   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy