4.5 Article

PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Statistics & Probability

An optimized machine learning technology scheme and its application in fault detection in wireless sensor networks

Fang Fan et al.

Summary: In this paper, a productive technical solution is proposed for fault detection in data collection in wireless sensor networks by combining evolutionary computing and machine learning. The proposed RS-PPSO algorithm successfully optimizes the initial weights and biases of the back propagation neural network, leading to shorter training time and improved prediction accuracy.

JOURNAL OF APPLIED STATISTICS (2023)

Article Computer Science, Information Systems

Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of Things

Xin Huang et al.

Summary: In this paper, we propose an efficient revocable storage ciphertext-policy attribute-based encryption with arithmetic span programs (RS-CPABE-ASP) to balance revocability and access policy in practical scenarios. Our work combines indirect revocation and ciphertext update mechanisms to prevent revoked users from accessing new and old data. The outsourced version of RS-CPABE-ASP allows users to decrypt data efficiently through one exponential operation.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks

Chenyu Wang et al.

Summary: Despite years of research, designing a practical multi-factor user authentication scheme for wireless sensor networks is still challenging due to the security versus efficiency dilemma. Common security failures include smart card loss attacks and node capture attacks, with the latter receiving less attention compared to the former. This article systematically explores node capture attacks, providing insights for secure user authentication scheme design in WSNs.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

A Secure and Efficient Energy Trading Model Using Blockchain for a 5G-Deployed Smart Community

Adamu Sani Yahaya et al.

Summary: This paper proposes a blockchain-based privacy-preserving energy trading system for 5G-deployed Smart Communities, divided into components for EVs and residential prosumers. It includes a reputation-based matching algorithm for EVs, a Reward-based Starvation Free Energy Allocation Policy, and a short-term load forecasting model. By integrating encryption techniques to protect privacy, the system demonstrates strong performance metrics.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)

Article Computer Science, Hardware & Architecture

Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs

Hu Xiong et al.

Summary: This article proposes a novel conditional privacy-preserving authentication protocol for VANETs based on the Chinese remainder theorem (CRT). It addresses the challenges of dynamically updating membership and preserving user privacy, while providing message authentication, anonymity, and forward and backward security.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Automation & Control Systems

A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems

Muhammad Asghar Khan et al.

Summary: This article discusses the application of UAVs in transportation systems, highlights security and privacy concerns, and proposes a privacy-preserving authentication scheme using specific technologies.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Engineering, Marine

A resource friendly authentication scheme for space-air-ground-sea integrated Maritime Communication Network

Muhammad Asghar Khan et al.

Summary: This study proposes an improved and resource-friendly authentication scheme for maritime communication networks using Elliptic Curve Cryptography (ECC), and validates its security using a formal security assessment method. The findings support the viability of the proposed scheme.

OCEAN ENGINEERING (2022)

Article Computer Science, Information Systems

Machine learning for 5G security: Architecture, recent advances, and challenges

Amir Afaq et al.

Summary: This article discusses the emerging security threats in 5G networks and the feasibility and architecture of using machine learning models to mitigate these threats. It also presents an automated threat intelligence architecture aimed at protecting 5G assets and infrastructure through collaborative and coordinated machine learning.

AD HOC NETWORKS (2021)

Review Computer Science, Information Systems

Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks

Chien-Ming Chen et al.

Summary: 5G, as a new generation of mobile communication technology, addresses the needs of IoT applications, but also poses security and privacy threats.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure

Chien-Ming Chen et al.

Summary: The Internet of Things (IoT) is a huge network of information sensing devices connected through the Internet, but network security is crucial for their use. A study showed vulnerabilities in the current authentication protocol and proposed an improved protocol with better security and advantages in time and memory consumption.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Construction & Building Technology

An anonymous device to device access control based on secure certificate for internet of medical things systems

Shehzad Ashraf Chaudhry et al.

Summary: The Internet of Medical Things (IoMT) is based on sensing and communication infrastructure as well as computation facilities, providing convenient and cost-effective ways for healthcare by enabling remote access to patients' physiological data. However, communication delays in IoMT can be very harmful to healthcare.

SUSTAINABLE CITIES AND SOCIETY (2021)

Article Computer Science, Information Systems

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks

Tsu-Yang Wu et al.

Summary: Wireless sensor networks, composed of sensor nodes self-organizing through wireless communication technology, require high security in their applications. To ensure secure information transmission, researchers propose various security authentication protocols. The newly proposed three-factor authentication protocol is found to be vulnerable to specific attacks, prompting the proposal of an enhanced protocol with higher security.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Computer Science, Artificial Intelligence

Hybrid Internet of Things (IoT) data transmission security corresponding to device verification

Ming-Shen Jian et al.

Summary: The research proposes a Hybrid Internet Of Things (IoT) Data Transmission Security corresponding to Device Verification, where each IoT device can be differentiated and identified individually, ensuring automatic configuration and secure data transmission.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Artificial Intelligence

New Enhanced Authentication Protocol for Internet of Things

Mourade Azrour et al.

Summary: Internet of Things (IoT) is a new extended network that connects any object to the Internet for data exchange and remote control. Despite its advantages in multiple areas, ensuring security of user data remains a central concern, making authentication and key exchange protocols crucial. Ye et al. proposed a protocol in 2012, but it was found to be vulnerable to attacks, leading to the need for enhanced authentication protocols like the one proposed in this paper.

BIG DATA MINING AND ANALYTICS (2021)

Article Engineering, Electrical & Electronic

Identifying correctness data scheme for aggregating data in cluster heads of wireless sensor network based on naive Bayes classification

Shu-Chuan Chu et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2020)

Article Engineering, Electrical & Electronic

5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy

Rongxing Lu et al.

PROCEEDINGS OF THE IEEE (2020)

Article Engineering, Electrical & Electronic

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

Akasha Shafiq et al.

JOURNAL OF SENSORS (2020)

Article Chemistry, Analytical

A Lightweight Three-Factor Authentication Scheme for WHSN Architecture

Abdullah M. Almuhaideb et al.

SENSORS (2020)

Article Computer Science, Information Systems

Anonymous three-factor authenticated key agreement for wireless sensor networks

Yanrong Lu et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Artificial Intelligence

Using Compact Evolutionary Tabu Search algorithm for matching sensor ontologies

Xingsi Xue et al.

SWARM AND EVOLUTIONARY COMPUTATION (2019)

Article Computer Science, Interdisciplinary Applications

An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system

Preeti Soni et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2019)

Article Computer Science, Information Systems

A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks

Jiaqing Mo et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Information Systems

An improved and provably secure three-factor user authentication scheme for wireless sensor networks

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)

Review Computer Science, Theory & Methods

IoT security: Review, blockchain solutions, and open challenges

Minhaj Ahmad Khan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Chemistry, Multidisciplinary

A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol

Chien-Ming Chen et al.

APPLIED SCIENCES-BASEL (2018)

Article Telecommunications

DDoS attacks in WSNs: detection and countermeasures

Ademola P. Abidoye et al.

IET WIRELESS SENSOR SYSTEMS (2018)

Article Computer Science, Theory & Methods

Internet of Things (IoT): A vision, architectural elements, and future directions

Jayavardhana Gubbi et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)

Article Telecommunications

Node capture attack detection and defence in wireless sensor networks

S. H. Jokhio et al.

IET WIRELESS SENSOR SYSTEMS (2012)