ECG signals-based security and steganography approaches in WBANs: A comprehensive survey and taxonomy
Abstract Wireless Body Area Networks (WBANs) are integral components of e-healthcare
systems, responsible for monitoring patients' physiological states through intelligent …
systems, responsible for monitoring patients' physiological states through intelligent …
Lightweight authentication scheme for healthcare with robustness to desynchronization attacks
Remote healthcare monitoring systems are gaining a lot of interest as they enable doctors to
use public channels to get real-time data from the sensors placed in/on the patient's body …
use public channels to get real-time data from the sensors placed in/on the patient's body …
Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT devices
Internet of Things (IoT) is one of the most representative application scenarios in the 5G and
6G era. The concurrent access of massive IoT devices definitely poses enormous …
6G era. The concurrent access of massive IoT devices definitely poses enormous …
Lightweight Group Authentication Scheme Leveraging Shamir's Secret Sharing and PUFs
With the proliferation of edge-computing (EC), Internet-of-things (IoT), and smart
applications, many challenging security scenarios arise. For example, a common scenario in …
applications, many challenging security scenarios arise. For example, a common scenario in …
liteGAP: Lightweight Group Authentication Protocol for Internet of Drones Systems
Over the past few years, the synergic usage of unmanned aerial vehicles (later drones) and
Internet of Things (IoT) has successfully transformed into the Internet of Drones (IoD) …
Internet of Things (IoT) has successfully transformed into the Internet of Drones (IoD) …
Group Authentication and Key Establishment Scheme
Group authentication is a technique that verifies the group membership of multiple users and
establishes a shared secret key among them. Unlike the conventional authentication …
establishes a shared secret key among them. Unlike the conventional authentication …
An edge-assisted group authentication scheme for the narrowband internet of things
G Zhao, H Chen, J Wang - Complex & Intelligent Systems, 2024 - Springer
As an emerging wireless communication technology, narrowband Internet of Things is
widely used in various scenarios, but it also brings new security problems, especially the …
widely used in various scenarios, but it also brings new security problems, especially the …
A smart agriculture solution includes intelligent irrigation and security
T Nguyen-Tan, C Dang-Ngoc, Q Le-Trung - International Conference on …, 2023 - Springer
One of the key roles of a smart agricultural system is irrigation, which is carried out
automatically, optimally, and at each stage of the growth of each crop. The optimal soil …
automatically, optimally, and at each stage of the growth of each crop. The optimal soil …
A Lightweight Aggregate Authentication Protocol for Internet of Drones
C Pu, KKR Choo - 2024 IEEE 21st Consumer Communications …, 2024 - ieeexplore.ieee.org
The Internet of Drones (IoD), an innovative aerial-ground communication architecture, has
quickly became the driving force for various civilian applications (eg, body temperature …
quickly became the driving force for various civilian applications (eg, body temperature …
[PDF][PDF] Security Analysis of One Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0
K Song, L Liu - International Journal of Electronics and …, 2024 - ijeie.jalaxy.com.tw
We show that Xu et al.'s authentication and key agreement scheme [IEEE Trans. Ind.
Informatics, 18 (10), 7118-7127, 2022] fails to realize its design targets.(1) It confused some …
Informatics, 18 (10), 7118-7127, 2022] fails to realize its design targets.(1) It confused some …