[HTML][HTML] Resilience assessment of a subsea pipeline using dynamic Bayesian network
Microbiologically influenced corrosion (MIC) is a serious concern and plays a significant role
in the marine and subsea industry's infrastructure failure. A probabilistic methodology is …
in the marine and subsea industry's infrastructure failure. A probabilistic methodology is …
A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks
Recently, Sahoo et al. introduced a three-factor authentication scheme for Wireless Sensor
Networks (WSNs) based on an elliptic curve cryptosystem. Nonetheless, upon closer …
Networks (WSNs) based on an elliptic curve cryptosystem. Nonetheless, upon closer …
IoV-SMAP: Secure and efficient message authentication protocol for IoV in smart city environment
With the emergence of the concept of smart city and the increasing demands for a range of
vehicles, Internet of Vehicles (IoV) has achieved a lot of attention by providing multiple …
vehicles, Internet of Vehicles (IoV) has achieved a lot of attention by providing multiple …
An efficient authentication and key agreement scheme based on ECDH for wireless sensor network
MF Moghadam, M Nikooghadam, MAB Al Jabban… - IEEe …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSN) consist of a large number of resource-constrained sensor
nodes, different types of controls, and gateway nodes. these kinds of networks are used as …
nodes, different types of controls, and gateway nodes. these kinds of networks are used as …
Implication of lightweight and robust hash function to support key exchange in health sensor networks
M Al-Zubaidie - Symmetry, 2023 - mdpi.com
Internet of Things (IoT) applications are critical for the fast delivery of health information/data
in different environments. The wireless sensor network (WSN) can be used within IoT …
in different environments. The wireless sensor network (WSN) can be used within IoT …
RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing
RSEAP is a recently proposed RFID based authentication protocol for vehicular cloud
computing whose authors claimed to be secure and efficient. In this article, we challenge …
computing whose authors claimed to be secure and efficient. In this article, we challenge …
Designing an efficient and secure message exchange protocol for internet of vehicles
SA Chaudhry - Security and Communication Networks, 2021 - Wiley Online Library
In the advancements in computation and communication technologies and increasing
number of vehicles, the concept of Internet of Vehicles (IoV) has emerged as an integral part …
number of vehicles, the concept of Internet of Vehicles (IoV) has emerged as an integral part …
[HTML][HTML] Authentication scheme for unmanned aerial vehicles based internet of vehicles networks
New and advanced technologies have introduced amazing areas like the Internet of
Vehicles (IoV) and Unmanned Aerial Vehicle (UAV). These two technologies are emerged to …
Vehicles (IoV) and Unmanned Aerial Vehicle (UAV). These two technologies are emerged to …
A decentralized proxy-JRC authentication system for scalable IETF 6TiSCH networks
Many Industrial Internet of Things (IIoT) applications require wireless networks with low
power consumption, low latency, and secure communication. The IPv6 over the TSCH mode …
power consumption, low latency, and secure communication. The IPv6 over the TSCH mode …
Smart card-based identity management protocols for V2V and V2I communications in CCAM: A systematic literature review
S Berlato, M Centenaro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Besides developing new Cooperative, Connected and Automated Mobility (CCAM) services
for the improvement of road safety and travel experience, researchers are considering …
for the improvement of road safety and travel experience, researchers are considering …