[HTML][HTML] Resilience assessment of a subsea pipeline using dynamic Bayesian network

M Yazdi, F Khan, R Abbassi, N Quddus - Journal of Pipeline Science and …, 2022 - Elsevier
Microbiologically influenced corrosion (MIC) is a serious concern and plays a significant role
in the marine and subsea industry's infrastructure failure. A probabilistic methodology is …

A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks

G Thakur, S Prajapat, P Kumar, CM Chen - Journal of Systems Architecture, 2024 - Elsevier
Recently, Sahoo et al. introduced a three-factor authentication scheme for Wireless Sensor
Networks (WSNs) based on an elliptic curve cryptosystem. Nonetheless, upon closer …

IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment

S Yu, J Lee, K Park, AK Das, Y Park - IEEE access, 2020 - ieeexplore.ieee.org
With the emergence of the concept of smart city and the increasing demands for a range of
vehicles, Internet of Vehicles (IoV) has achieved a lot of attention by providing multiple …

An efficient authentication and key agreement scheme based on ECDH for wireless sensor network

MF Moghadam, M Nikooghadam, MAB Al Jabban… - IEEe …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor
nodes, different types of controls, and gateway nodes. these kinds of networks are used as …

Implication of lightweight and robust hash function to support key exchange in health sensor networks

M Al-Zubaidie - Symmetry, 2023 - mdpi.com
Internet of Things (IoT) applications are critical for the fast delivery of health information/data
in different environments. The wireless sensor network (WSN) can be used within IoT …

RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing

M Safkhani, C Camara, P Peris-Lopez… - Vehicular …, 2021 - Elsevier
RSEAP is a recently proposed RFID based authentication protocol for vehicular cloud
computing whose authors claimed to be secure and efficient. In this article, we challenge …

Designing an efficient and secure message exchange protocol for internet of vehicles

SA Chaudhry - Security and Communication Networks, 2021 - Wiley Online Library
In the advancements in computation and communication technologies and increasing
number of vehicles, the concept of Internet of Vehicles (IoV) has emerged as an integral part …

[HTML][HTML] Authentication scheme for unmanned aerial vehicles based internet of vehicles networks

KN Qureshi, MAS Sandila, IT Javed, T Margaria… - Egyptian Informatics …, 2022 - Elsevier
New and advanced technologies have introduced amazing areas like the Internet of
Vehicles (IoV) and Unmanned Aerial Vehicle (UAV). These two technologies are emerged to …

A decentralized proxy-JRC authentication system for scalable IETF 6TiSCH networks

H Aydin, S Gormus, B Aydin - IEEE Access, 2024 - ieeexplore.ieee.org
Many Industrial Internet of Things (IIoT) applications require wireless networks with low
power consumption, low latency, and secure communication. The IPv6 over the TSCH mode …

Smart card-based identity management protocols for V2V and V2I communications in CCAM: A systematic literature review

S Berlato, M Centenaro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Besides developing new Cooperative, Connected and Automated Mobility (CCAM) services
for the improvement of road safety and travel experience, researchers are considering …