A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance

M Nikooghadam, H Amintoosi, SKH Islam… - Journal of Systems …, 2021 - Elsevier
Smart cities are made of different interconnected components that exchange data and
facilitate the urban living for citizens. Unmanned Aerial Vehicles, known as drones, are …

Securing session initiation protocol

O Younes, U Albalawi - Sensors, 2022 - mdpi.com
The session initiation protocol (SIP) is widely used for multimedia communication as a
signaling protocol for managing, establishing, maintaining, and terminating multimedia …

A provably secure ECC-based roaming authentication scheme for global mobility networks

M Nikooghadam, H Amintoosi, S Kumari - Journal of Information Security …, 2020 - Elsevier
The advent of Internet of Things have paved the way for providing smart services for mobile
users in the smart city. Due to the rapid movement of users and their fast information …

HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment

M Nikooghadam, HR Shahriari, ST Saeidi - Journal of Information Security …, 2023 - Elsevier
The ever-increasing internet usage has led to creation of Internet of Things. RFID is one of
the most common tracking tools for objects in Internet of Things, which has many different …

[PDF][PDF] TAMA: three-factor authentication for multi-server architecture

H Amintoosi, M Nikooghadam, S Kumari… - … -centric Computing and …, 2021 - hcisj.com
Thanks to the sharp improvement in computer science and information technology, we are
witnessing the emergence of new mobile-based Internet services such as telemedicine …

Leveraging blockchain for device registration and authentication in tSIP-based phone-of-things (PoT) systems

H Khalil, K Elgazzar - 2023 International Wireless …, 2023 - ieeexplore.ieee.org
Phone of Things (PoT) is a new paradigm in IoT that has been recently coined in the
literature. PoT provides a framework for leveraging the ubiquitous phone network assets and …

perbp: a cloud-based lightweight mutual authentication protocol

M Adeli, N Bagheri, S Sadeghi, S Kumari - Peer-to-Peer Networking and …, 2023 - Springer
Cloud-based RFID is gaining popularity in tandem with the growth of cloud computing and
the Internet of Things (IoT). The cloud-based RFID system is developed with the intent of …

A decentralized lightweight authentication protocol under blockchain

M Xu, G Xu, H Xu, J Zhou, S Li - Concurrency and Computation …, 2022 - Wiley Online Library
With the continuous development of blockchain technology, blockchain gradually becomes
to play an important role in the fields of finance, medicine, and new energy. In the …

Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew‐Assisted IoT Systems

Y Ma, Y Ma, Q Cheng - Security and Communication Networks, 2022 - Wiley Online Library
Real‐time and high‐efficient communication becomes a vital property for IoT‐enabled
equipment, since the application range of the Internet of Things has extended widely. At the …

[PDF][PDF] An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy.

SAH Seno, M Nikooghadam… - Computers, Materials & …, 2021 - cdn.techscience.cn
Tele-medical information system provides an efficient and convenient way to connect
patients at home with medical personnel in clinical centers. In this system, service providers …