Game theory meets wireless sensor networks security requirements and threats mitigation: A survey

MS Abdalzaher, K Seddik, M Elsabrouty, O Muta… - Sensors, 2016 - mdpi.com
We present a study of using game theory for protecting wireless sensor networks (WSNs)
from selfish behavior or malicious nodes. Due to scalability, low complexity and …

An energy-efficient and secure routing protocol for intrusion avoidance in IoT-based WSN

K Haseeb, A Almogren, N Islam, I Ud Din, Z Jan - Energies, 2019 - mdpi.com
Due to the advancement of information and communication technologies, the use of Internet
of Things (IoT) devices has increased exponentially. In the development of IoT, wireless …

Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks

J Li, M Wen, T Zhang - IEEE Internet of Things Journal, 2015 - ieeexplore.ieee.org
Machine type communication (MTC) is an important mobile communication approach in the
long-term evaluation-advanced (LTE-A) networks. To meet the MTC security requirements …

PUF‐Assisted Lightweight Group Authentication and Key Agreement Protocol in Smart Home

Y Xia, R Qi, S Ji, J Shen, T Miao… - … and Mobile Computing, 2022 - Wiley Online Library
Various IoT‐based applications such as smart home, intelligent medical, and VANETs have
been put into practical utilization. The smart home is one of the most concerned …

Secret image sharing scheme with lossless recovery and high efficiency

S Luo, Y Liu, X Yan, Y Yu - Signal Processing, 2023 - Elsevier
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow
images of reduced size, which is beneficial for storage, transmission, and processing …

PLGAKD: A PUF-based lightweight group authentication and key distribution protocol

H Yıldız, M Cenk, E Onur - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Securing Internet-of-Things (IoT) applications that collect and transport sensitive data by
guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing …

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

H Arshad, M Nikooghadam - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the
voice over internet protocol (VoIP). Authentication is an important security requirement for …

A flexible and lightweight group authentication scheme

Y Aydin, GK Kurt, E Ozdemir… - IEEE internet of things …, 2020 - ieeexplore.ieee.org
Internet-of-Things (IoT) networks are becoming a part of our daily lives, as the number of IoT
devices around us are surging. The authentication of millions of connected things and the …

A novel authentication scheme supporting multiple user access for 5G and beyond

C Lai, Y Ma, R Lu, Y Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The deployment of ultra-dense networks in the fifth-generation (5 G) network architecture
can significantly improve the quality of wireless links, but this will cause frequent handovers …

GASE: A lightweight group authentication scheme with key agreement for edge computing applications

M Nakkar, R AlTawy, A Youssef - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Motivated by the fact that mass authentication is one of the desirable security features in the
edge computing paradigm, we propose a lightweight group authentication protocol with a …