Game theory meets wireless sensor networks security requirements and threats mitigation: A survey
We present a study of using game theory for protecting wireless sensor networks (WSNs)
from selfish behavior or malicious nodes. Due to scalability, low complexity and …
from selfish behavior or malicious nodes. Due to scalability, low complexity and …
An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN
Due to the advancement of information and communication technologies, the use of Internet
of Things (IoT) devices has increased exponentially. In the development of IoT, wireless …
of Things (IoT) devices has increased exponentially. In the development of IoT, wireless …
Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks
Machine type communication (MTC) is an important mobile communication approach in the
long-term evaluation-advanced (LTE-A) networks. To meet the MTC security requirements …
long-term evaluation-advanced (LTE-A) networks. To meet the MTC security requirements …
PUF‐Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home
Y Xia, R Qi, S Ji, J Shen, T Miao… - … and Mobile Computing, 2022 - Wiley Online Library
Various IoT‐based applications such as smart home, intelligent medical, and VANETs have
been put into practical utilization. The smart home is one of the most concerned …
been put into practical utilization. The smart home is one of the most concerned …
Secret image sharing scheme with lossless recovery and high efficiency
S Luo, Y Liu, X Yan, Y Yu - Signal Processing, 2023 - Elsevier
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow
images of reduced size, which is beneficial for storage, transmission, and processing …
images of reduced size, which is beneficial for storage, transmission, and processing …
PLGAKD: A PUF-based lightweight group authentication and key distribution protocol
Securing Internet-of-Things (IoT) applications that collect and transport sensitive data by
guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing …
guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing …
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
H Arshad, M Nikooghadam - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the
voice over internet protocol (VoIP). Authentication is an important security requirement for …
voice over internet protocol (VoIP). Authentication is an important security requirement for …
A flexible and lightweight group authentication scheme
Internet-of-Things (IoT) networks are becoming a part of our daily lives, as the number of IoT
devices around us are surging. The authentication of millions of connected things and the …
devices around us are surging. The authentication of millions of connected things and the …
A novel authentication scheme supporting multiple user access for 5G and beyond
The deployment of ultra-dense networks in the fifth-generation (5 G) network architecture
can significantly improve the quality of wireless links, but this will cause frequent handovers …
can significantly improve the quality of wireless links, but this will cause frequent handovers …
GASE: A lightweight group authentication scheme with key agreement for edge computing applications
Motivated by the fact that mass authentication is one of the desirable security features in the
edge computing paradigm, we propose a lightweight group authentication protocol with a …
edge computing paradigm, we propose a lightweight group authentication protocol with a …