4.8 Article

LSNCP: Lightweight and Secure Numeric Comparison Protocol for Wireless Body Area Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Security analysis of Bluetooth Secure Simple Pairing protocols with extended threat model

Haotian Yin

Summary: Bluetooth technology is widely used for short-distance communication and its pairing protocol has faced increasing security attacks. The CYBORG model proposed an improved Passkey Entry protocol, but it fails to cover current attacks and threats. We analyzed the threat models, revealing weaknesses and insecurities in the SSP protocols.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems

Haleh Amintoosi et al.

Summary: This article proposes a secure and authenticated data storage, access, and sharing model for private cloud storage. It includes three components to provide secure storage, controlled sharing, and authenticated access for users.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX

Xin Liu et al.

Summary: This article introduces a secure authentication scheme for WSNs based on Dynamic Authentication Credential (DAC) and Intel Software Guard Extensions (SGX), which can effectively prevent asynchronous update issues, resist privileged user attacks, and authentication table leakage attacks, and has been verified for security through various methods.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

MoTH: Mobile Terminal Handover Security Protocol for HUB Switching Based on 5G and Beyond (5GB) P2MP Backhaul Environment

Jiyoon Kim et al.

Summary: With the development of 5G and beyond communication, wireless backhaul plays a crucial role in providing efficient coverage and service quality for 5GB infrastructure, while addressing the increasing data traffic. However, wireless backhaul also poses security threats and vulnerabilities. To overcome the limitations of existing protocols, the MoTH security protocol is proposed to ensure secure handover of mobile terminals, and its security and correctness are verified using formal analysis tools.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices

Jin Cao et al.

Summary: The smart city is a vision for urban development that utilizes new-generation information technologies to enhance quality of life. The Internet of Things (IoT) technology is crucial for smart cities, but it faces challenges in terms of security and performance. This article presents a remote identity attestation protocol for massive IoT devices based on the reputation mechanism and physically unclonable function (PUF). The protocol achieves efficient and secure mutual authentication and key agreement between IoT devices and the central server, as well as between IoT devices.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

A secure authentication scheme for IoT application in smart home

Pankaj Kumar et al.

Summary: This study proposed a smart card-based secure addressing and authentication scheme for IoT devices by modifying the standard IPv6 protocol, providing unique addressing and authentication methods with secret session keys to prevent unauthorized access. Security analysis demonstrates the effectiveness of the scheme in protecting smart home IoT networks from various vulnerabilities and attacks.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Theory & Methods

Key Generation for Internet of Things: A Contemporary Survey

Weitao Xu et al.

Summary: The paper surveys recent key generation systems, classifying them based on a novel taxonomy and providing quantitative and qualitative comparisons. It also discusses security vulnerabilities and potential countermeasures in key generation schemes, as well as current challenges and future research directions.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Hardware & Architecture

Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence

Jie Zhang et al.

Summary: Edge Artificial Intelligence introduces intelligence to edge devices, alleviating privacy concerns and enabling real-time operations. Security is a significant concern, and the article proposes lightweight authenticated key exchange protocols to enhance security in Edge AI applications.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial

Mohamed Amine Ferrag et al.

Summary: This article presents research challenges and a tutorial on the performance evaluation of blockchain-based security and privacy systems for IoT. The article reviews existing surveys, blockchain applications in IoT, consensus algorithms, security analysis techniques, performance metrics, and open challenges. The study provides insights into building and evaluating blockchain-based security and privacy systems and highlights future research opportunities.

IEEE INTERNET OF THINGS JOURNAL (2021)

Proceedings Paper Computer Science, Information Systems

The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol

Michael Troncoso et al.

Summary: This paper computationally analyzes Passkey Entry as a cryptographic authenticated key exchange, identifies security vulnerabilities, proposes design improvements with the use of a CYBORG model, and introduces a new Dual Passkey Entry generation mode. The work highlights potential exploit categories in Bluetooth Passkey Entry based on compromise type.

28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021) (2021)

Article Computer Science, Hardware & Architecture

Identification of Wearable Devices with Bluetooth

Hidayet Aksu et al.

Summary: The research introduces a wearable fingerprinting technique focusing on the Bluetooth classic protocol, utilizing machine learning algorithms to achieve accurate and efficient identification of wearable devices. Experimental results demonstrate the feasibility of the proposed technique, with an average accuracy of 98.5% and precision and recall of 98.3% for identifying wearables using the Bluetooth classic protocol.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2021)

Article Computer Science, Information Systems

Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network

Qi Jiang et al.

Summary: The paper presents an optimal key agreement scheme based on heartbeats, utilizing fuzzy commitment for feature extraction and introducing a physiological-distribution-based parameter optimization algorithm. The proposed scheme ensures stable and outstanding performance among individuals while guaranteeing security.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Article Computer Science, Information Systems

A Survey of Healthcare Internet of Things (HIoT): A Clinical Perspective

Hadi Habibzadeh et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems

Jiping Li et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0

Dongkun Hou et al.

2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

Leakage-Resilient and Lightweight Authenticated Key Exchange for E-Health

Wenjun Zeng et al.

2020 THE 6TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2020) (2020)

Article Computer Science, Information Systems

Preserving Privacy in Mobile Health Systems Using Non-Interactive Zero-Knowledge Proof and Blockchain

Antonio Emerson Barros Tomaz et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

The Future of Healthcare Internet of Things: A Survey of Emerging Technologies

Yazdan Ahmad Qadri et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Health Care Sciences & Services

Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare

Km Renuka et al.

JOURNAL OF MEDICAL SYSTEMS (2019)

Article Health Care Sciences & Services

MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems

Muhammad Yaseen et al.

JOURNAL OF MEDICAL SYSTEMS (2019)

Review Computer Science, Information Systems

IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices

Francesca Meneghello et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Telecommunications

Developing a platform to evaluate and assess the security of wearable devices

Matthew L. Hale et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2019)

Review Computer Science, Information Systems

Security Vulnerabilities, Attacks, Countermeasures, and Regulations of Networked Medical Devices-A Review

Tehreem Yaqoob et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Survey and Systematization of Secure Device Pairing

Mikhail Fomichev et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Information Systems

Personal PIN Leakage from Wearable Devices

Chen Wang et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)

Article Computer Science, Information Systems

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment

Ashok Kumar Das et al.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2018)

Article Computer Science, Information Systems

A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things

Shi-Cho Cha et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Theory & Methods

Two-Factor Authentication with End-to-End Password Security

Stanislaw Jarecki et al.

PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II (2018)

Article Engineering, Electrical & Electronic

Stress Events Detection of Driver by Wearable Glove System

Dae Seok Lee et al.

IEEE SENSORS JOURNAL (2017)

Article Computer Science, Information Systems

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He et al.

IEEE SYSTEMS JOURNAL (2017)

Review Computer Science, Information Systems

A Survey on Security and Privacy Issues in Internet-of-Things

Yuchen Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

SecIoT: a security framework for the Internet of Things

Xin Huang et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

A Secure System For Pervasive Social Network-Based Healthcare

Jie Zhang et al.

IEEE ACCESS (2016)

Article Computer Science, Information Systems

Secure Device Pairing: A Survey

Shahab Mirzadeh et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Proceedings Paper Computer Science, Information Systems

Formal Analysis of Secure Device Pairing Protocols

Trung Nguyen et al.

2014 IEEE 13TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA 2014) (2014)

Article Computer Science, Information Systems

Secure Ad Hoc Trust Initialization and Key Management in Wireless Body Area Networks

Ming Li et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2013)

Article Computer Science, Information Systems

Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey

L. H. Nguyen et al.

JOURNAL OF COMPUTER SECURITY (2011)

Article Engineering, Electrical & Electronic

A New Design of Wearable Token System for Mobile Device Security

Da-Zhi Sun et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2008)