Trusted authority based session key agreement and authentication algorithm for smart grid networks
VO Nyangaresi, M Abd‐Elnaby… - Transactions on …, 2022 - Wiley Online Library
The information exchanged over the smart grid networks is sensitive and private. As such,
proper mechanisms must be put in place to protect these messages from security and …
proper mechanisms must be put in place to protect these messages from security and …
Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …
[HTML][HTML] Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
VO Nyangaresi - High-Confidence Computing, 2023 - Elsevier
Unmanned aerial vehicles offer services such as military reconnaissance in potentially
adversarial controlled regions. In addition, they have been deployed in civilian critical …
adversarial controlled regions. In addition, they have been deployed in civilian critical …
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
As the automotive and telecommunication industries advance, more vehicles are becoming
connected, leading to the realization of intelligent transportation systems (ITS). Vehicular ad …
connected, leading to the realization of intelligent transportation systems (ITS). Vehicular ad …
ECC based authentication scheme for smart homes
VO Nyangaresi - 2021 International Symposium ELMAR, 2021 - ieeexplore.ieee.org
Smart homes security has attracted a lot of attention from both the industry and academia,
leading to the development of numerous schemes for both key management and …
leading to the development of numerous schemes for both key management and …
Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks
ZA Abduljabbar, V Omollo Nyangaresi… - Journal of Sensor and …, 2022 - mdpi.com
Wireless networks have continued to evolve to offer connectivity between users and smart
devices such as drones and wireless sensor nodes. In this environment, insecure public …
devices such as drones and wireless sensor nodes. In this environment, insecure public …
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things
To ensure secure access to the data held in internet of things, many lightweight
authentication schemes have been developed using approaches such as symmetric …
authentication schemes have been developed using approaches such as symmetric …
Provably secure protocol for 5G HetNets
VO Nyangaresi - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
The fifth generation (5G) networks exhibit high data rates and capacities that endear them to
applications such as internet of things (IoT) and mobile banking. Due to sensitivity of data …
applications such as internet of things (IoT) and mobile banking. Due to sensitivity of data …
Hardware assisted protocol for attacks prevention in ad hoc networks
VO Nyangaresi - Emerging Technologies in Computing: 4th EAI/IAER …, 2021 - Springer
The packet exchanges over open communication channels expose ad hoc networks data to
numerous security and privacy attacks. To address this issue, many schemes have been …
numerous security and privacy attacks. To address this issue, many schemes have been …
[PDF][PDF] A Formally Verified Authentication Scheme for mmWave Heterogeneous Networks
VO Nyangaresi - the 6th International Conference on Combinatorics …, 2021 - i4c.iust.ac.ir
The 5G mmWave networks support massive number of devices and offer salient features
such as very low communication latencies and high signal stability. This has seen these …
such as very low communication latencies and high signal stability. This has seen these …