Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography

VO Nyangaresi - Journal of Systems Architecture, 2022 - Elsevier
The communication channel between the smart home devices and the remote users is
susceptible to numerous privacy and security compromise attacks. To address these issues …

A systematic review on demand response role toward sustainable energy in the smart grids-adopted buildings sector

AM Al-Ghaili, ZAB Ibrahim, AA Bakar, H Kasim… - IEEE …, 2023 - ieeexplore.ieee.org
In the so near future, climate change caused by Carbon dioxide (CO 2) emissions as a result
of an increase in energy demand (ED) in the buildings sector becomes really hazard to our …

[HTML][HTML] ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor

SJ Yu, KS Park - Journal of Systems Architecture, 2022 - Elsevier
Smart grid (SG) has been received significant attention due to various services such as
renewable energy and demand response. However, SG is fragile to various security attacks …

CKMIB: Construction of key agreement protocol for cloud medical infrastructure using blockchain

S Itoo, AA Khan, V Kumar, A Alkhayyat, M Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
In the traditional medical healthcare system, each medical facility is responsible for
preserving its own records. Sharing such records with another medical establishment is …

PAAF-SHS: PUF and authenticated encryption based authentication framework for the IoT-enabled smart healthcare system

A Aldosary, M Tanveer - Internet of Things, 2024 - Elsevier
Abstract The Internet of Things (IoT) is increasingly becoming a fundamental component of
our everyday existence with the swift advancement in communication technology. Critical …

RAFI: Robust authentication framework for IoT-based RFID infrastructure

V Kumar, R Kumar, AA Khan, V Kumar, YC Chen… - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) is a future trend that uses the Internet to connect a variety of
physical things with the cyber world. IoT technology is rapidly evolving, and it will soon have …

A secure and energy efficient key agreement framework for vehicle-grid system

AA Khan, V Kumar, M Ahmad, S Jangirala - Journal of Information Security …, 2022 - Elsevier
Energy Internet (EI) is a two-way data flow that allows electric service providers and
consumers to investigate and change their energy usage. EI should be free of cyber-attacks …

PSEBVC: Provably secure ECC and biometric based authentication framework using smartphone for vehicular cloud environment

V Kumar, AMA Al-Tameemi, A Kumari, M Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
The Vehicular Cloud Environment (VCE) is a brand-new study field in cloud and vehicular
network. It gives cars networking and sensor capabilities for V2I or V2V communication with …

Low complexity smart grid security protocol based on elliptic curve cryptography, biometrics and hamming distance

KAA Mutlaq, VO Nyangaresi, MA Omar… - Plos one, 2024 - journals.plos.org
The incorporation of information and communication technologies in the power grids has
greatly enhanced efficiency in the management of demand-responses. In addition, smart …

A Review of DDoS Attack Detection and Prevention Mechanisms in Clouds

M Tehaam, S Ahmad, H Shahid… - 2022 24th …, 2022 - ieeexplore.ieee.org
Cloud provides access to shared pool of resources like storage, networking, and processing.
Distributed denial of service attacks are dangerous for Cloud services because they mainly …