Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography
VO Nyangaresi - Journal of Systems Architecture, 2022 - Elsevier
The communication channel between the smart home devices and the remote users is
susceptible to numerous privacy and security compromise attacks. To address these issues …
susceptible to numerous privacy and security compromise attacks. To address these issues …
A systematic review on demand response role toward sustainable energy in the smart grids-adopted buildings sector
AM Al-Ghaili, ZAB Ibrahim, AA Bakar, H Kasim… - IEEE …, 2023 - ieeexplore.ieee.org
In the so near future, climate change caused by Carbon dioxide (CO 2) emissions as a result
of an increase in energy demand (ED) in the buildings sector becomes really hazard to our …
of an increase in energy demand (ED) in the buildings sector becomes really hazard to our …
[HTML][HTML] ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor
Smart grid (SG) has been received significant attention due to various services such as
renewable energy and demand response. However, SG is fragile to various security attacks …
renewable energy and demand response. However, SG is fragile to various security attacks …
CKMIB: Construction of key agreement protocol for cloud medical infrastructure using blockchain
In the traditional medical healthcare system, each medical facility is responsible for
preserving its own records. Sharing such records with another medical establishment is …
preserving its own records. Sharing such records with another medical establishment is …
PAAF-SHS: PUF and authenticated encryption based authentication framework for the IoT-enabled smart healthcare system
A Aldosary, M Tanveer - Internet of Things, 2024 - Elsevier
Abstract The Internet of Things (IoT) is increasingly becoming a fundamental component of
our everyday existence with the swift advancement in communication technology. Critical …
our everyday existence with the swift advancement in communication technology. Critical …
RAFI: Robust authentication framework for IoT-based RFID infrastructure
The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of
physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have …
physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have …
A secure and energy efficient key agreement framework for vehicle-grid system
Energy Internet (EI) is a two-way data flow that allows electric service providers and
consumers to investigate and change their energy usage. EI should be free of cyber-attacks …
consumers to investigate and change their energy usage. EI should be free of cyber-attacks …
PSEBVC: Provably secure ECC and biometric based authentication framework using smartphone for vehicular cloud environment
The Vehicular Cloud Environment (VCE) is a brand-new study field in cloud and vehicular
network. It gives cars networking and sensor capabilities for V2I or V2V communication with …
network. It gives cars networking and sensor capabilities for V2I or V2V communication with …
Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance
KAA Mutlaq, VO Nyangaresi, MA Omar… - Plos one, 2024 - journals.plos.org
The incorporation of information and communication technologies in the power grids has
greatly enhanced efficiency in the management of demand-responses. In addition, smart …
greatly enhanced efficiency in the management of demand-responses. In addition, smart …
A Review of DDoS Attack Detection and Prevention Mechanisms in Clouds
Cloud provides access to shared pool of resources like storage, networking, and processing.
Distributed denial of service attacks are dangerous for Cloud services because they mainly …
Distributed denial of service attacks are dangerous for Cloud services because they mainly …