4.8 Article

REAP-IIoT: Resource-Efficient Authentication Protocol for the Industrial Internet of Things

Related references

Note: Only part of the references are listed.
Article Engineering, Multidisciplinary

Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing

Muhammad Tanveer et al.

Summary: This article introduces a resource-efficient authentication scheme called REAS-IoD for Internet of Drones networks. The scheme utilizes lightweight hash functions and authenticated encryption primitives to achieve secure authentication and key exchange. Through informal security verification and analysis using the Scyther tool, it is shown that REAS-IoD effectively prevents security attacks and is more efficient compared to other schemes.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System

Muhammad Tanveer et al.

Summary: This paper proposes a new resource-efficient authenticated encryption scheme for telecare medical information systems (REAS-TMIS) and demonstrates its resilience against various security attacks. Compared to related authentication protocols, REAS-TMIS requires fewer resources during the authentication phase.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones

Muhammad Tanveer et al.

Summary: The revolutionary advancement in hardware tools, software packages, and communication techniques has led to the rise of Internet of Things-supported drone networks (IoD). However, new security threats arise as the infrastructure of IoD becomes more sophisticated. In this paper, we propose a novel user authentication mechanism called RUAM-IoD, which utilizes elliptic curve cryptography, symmetric encryption, and hash function. We validate the security of RUAM-IoD through formal and informal analysis, and compare it with other state-of-the-art authentication schemes.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

LAKE-6SH: Lightweight User Authenticated Key Exchange for 6LoWPAN-Based Smart Homes

Muhammad Tanveer et al.

Summary: This article introduces a lightweight user AKE scheme (LAKE-6SH) for smart home networks, which establishes private session keys between users and network entities to achieve authenticity of RUs using the SHA-256 hash function, exclusive-OR operation, and a simple authenticated encryption primitive. The scheme has been informally validated to be secure against various security attacks, and further validated formally through the random oracle model and Scyther validation. Additionally, LAKE-6SH is shown to provide better security features with low communication and computational overheads.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones

Muhammad Tanveer et al.

Summary: This article proposes a robust authenticated key management (AKM) protocol for Internet of Drones (IoD) environment, called RAMP-IoD. RAMP-IoD utilizes lightweight cryptography-based authenticated encryption, elliptic-curve cryptography, and hash function to ensure reliable and secure communication. It verifies user authenticity and establishes an indecipherable session key (SK) for communication. Security analysis shows that RAMP-IoD is protected against replay and man-in-the-middle attacks, and is secure against various covert security attacks. Comparative study demonstrates that RAMP-IoD provides enhanced security with low storage, communication, and computational overheads compared to related AKM protocols.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Civil

Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems

Anil Kumar Sutrala et al.

Summary: With the rapid growth of ICT, CPS offers a wide range of applications in various areas. In ICPS, 5G technology and SDN introduce security threats, for which we propose the UAKA-5GSICPS scheme to address this issue.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

A Robust Access Control Protocol for the Smart Grid Systems

Muhammad Tanveer et al.

Summary: This article presents a novel AC protocol called RACP-SG aimed at enhancing the security of resource-constrained IoT-enabled SG systems. RACP-SG utilizes lightweight cryptography, hash functions, and elliptic curve cryptography to accomplish access control. It enables mutual authentication and secure data transfer between a smart meter and a service provider. The protocol is proven to be secure against various covert security risks and outperforms existing techniques in terms of security and performance.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography

Dipanwita Sadhukhan et al.

Summary: The development of IoT technology has made IoT services more reliable. In order to ensure secure data transmission between remote users and IoT networks, this research proposes a secure authentication scheme and verifies its reliability through multiple cryptographic attacks.

JOURNAL OF SUPERCOMPUTING (2021)

Article Automation & Control Systems

Designing Authenticated Key Management Scheme in 6G-Enabled Network in a Box Deployed for Industrial Applications

Mohammad Wazid et al.

Summary: 6G-enabled network in a box (NIB) is a multigenerational, rapidly deployable hardware and software technology for communication, providing high flexibility for various applications. A new security scheme UAKMS-NIB is proposed to secure 6G-enabled NIB deployed in industrial scenarios, showing resilience against possible attacks after security analysis. The practical demonstration and comparative analysis demonstrate that UAKMS-NIB outperforms existing schemes in network performance.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Multidisciplinary Sciences

A secure remote user authentication scheme for 6LoWPAN-based Internet of Things

Ghulam Abbas et al.

Summary: One of the significant challenges in IoT is ensuring security and privacy in resource-limited networks. This paper proposes a resource-efficient secure remote user authentication scheme, SRUA-IoT, to establish secure communication in 6LoWPAN-based networks. Through the use of a secure hash algorithm, exclusive-OR operation, and symmetric encryption primitive, SRUA-IoT authenticates remote users, establishes private session keys, and reduces computational cost and communication overheads.

PLOS ONE (2021)

Article Automation & Control Systems

Challenges and Opportunities in Securing the Industrial Internet of Things

Martin Serror et al.

Summary: The Industrial Internet of Things, also known as Industry 4.0, is a natural trend towards interconnecting devices in industrial settings, similar to the success seen in consumer IoT. Although it brings many benefits, it also introduces serious security challenges. Unlike consumer IoT, securing the Industrial IoT focuses more on safety and productivity requirements.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones

Sajid Hussain et al.

Summary: Continuous innovation and advancement in hardware, software, and communication technologies have led to the expansion and accelerated growth of Internet of Things-based drone networks, facilitating communication and data sharing among devices, applications, and people. IoD can enhance convenience in various applications including daily life, commercial, and military/rescue operations in smart cities. New customized solutions are needed to address security threats in IoD, with a proposed authentication scheme using elliptic curve cryptography and a discussion on its security aspects.

IEEE SYSTEMS JOURNAL (2021)

Article Multidisciplinary Sciences

A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments

Ya-Fen Chang et al.

Summary: Internet of Things (IoT) allows devices to exchange information, but security issues exist. Researchers proposed a three-factor authentication scheme, which has five flaws. The study suggests using ECC technology to improve the scheme.

SYMMETRY-BASEL (2021)

Article Computer Science, Information Systems

PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones

Muhammad Tanveer et al.

Summary: This article presents a Privacy-Protecting Authenticated Session Key Establishment for Internet of Drones (PASKE-IoD), utilizing Authenticated Encryption and hash function to ensure reliable communication and protect user privacy in the IoT environment. PASKE-IoD also enables secure communication between External Users and drones, while being immune to covert security attacks and verifying logical correctness through Burrows-Abadi-Needham logic. Additionally, a comparative analysis highlights the efficiency and enhanced security features of PASKE-IoD over existing ASKE schemes.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids

Muhammad Tanveer et al.

Summary: The Internet of Things-enabled smart grid technology offers advantages to traditional power grids, with the smart meter as a critical component for collecting power usage information. To preserve communication integrity and enable secure exchanges, an anonymous and reliable authentication protocol for smart grids is presented. This protocol uses cryptographic techniques to ensure secure communication and authorization for future exchanges. Through security analysis, it is confirmed that the protocol is effective in thwarting security attacks and providing improved security properties compared to other authentication protocols.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications

Yoney Kirsal Ever

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks

Tejasvi Alladi et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments

Zeeshan Ali et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

Zeeshan Ali et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Physically Secure, Lightweight Three-Factor and Anonymous User Authentication Protocol for IoT

Zhenhua Liu et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Anonymous three-factor authenticated key agreement for wireless sensor networks

Yanrong Lu et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Hardware & Architecture

A lightweight anonymous user authentication and key establishment scheme for wearable devices

Ankur Gupta et al.

COMPUTER NETWORKS (2019)

Article Computer Science, Information Systems

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

Jangirala Srinivas et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

Anonymous authentication scheme for smart home environment with provable security

Mengxia Shuai et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment

Soumya Banerjee et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones

Yifan Tian et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2019)

Article Computer Science, Theory & Methods

A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks

Fan Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A robust and anonymous patient monitoring system using wireless medical sensor networks

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication

Muhammad Naveed Aman et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment

Ashok Kumar Das et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

Sravani Challa et al.

IEEE ACCESS (2017)

Review Computer Science, Information Systems

General classification of the authenticated encryption schemes for the CAESAR competition

Farzaneh Abed et al.

COMPUTER SCIENCE REVIEW (2016)

Article Computer Science, Hardware & Architecture

A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks

Fan Wu et al.

COMPUTERS & ELECTRICAL ENGINEERING (2015)