Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

Anonymous authentication for wireless body area networks with provable security

D He, S Zeadally, N Kumar, JH Lee - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
Advances in wireless communications, embedded systems, and integrated circuit
technologies have enabled the wireless body area network (WBAN) to become a promising …

Improved ECC‐based three‐factor multiserver authentication scheme

TY Wu, L Yang, Z Lee, CM Chen… - Security and …, 2021 - Wiley Online Library
A multiserver environment can improve the efficiency of mobile network services more
effectively than a single server in managing the increase in users. Because of the large …

Linear SVM‐based android malware detection for reliable IoT services

HS Ham, HH Kim, MS Kim… - Journal of Applied …, 2014 - Wiley Online Library
Current many Internet of Things (IoT) services are monitored and controlled through
smartphone applications. By combining IoT with smartphones, many convenient IoT services …

On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices

D Wang, H Cheng, D He, P Wang - IEEE Systems Journal, 2016 - ieeexplore.ieee.org
Providing secure, efficient, and privacy-preserving user authentication in mobile networks is
a challenging problem due to the inherent mobility of users, variety of attack vectors, and …

Remote authentication schemes for wireless body area networks based on the Internet of Things

MES Saeed, QY Liu, G Tian, B Gao… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) is a new technology which offers enormous applications that make
people's lives more convenient and enhances cities' development. In particular, smart …

AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities

JL Li, WG Zhang, V Dabra, KKR Choo, S Kumari… - Journal of Network and …, 2019 - Elsevier
Mobile devices are an integral part of our society, although ensuring the security and privacy
of both data-at-rest and data-in-transit remains topics of ongoing interest. Privacy-preserving …

AKAIoTs: authenticated key agreement for Internet of Things

MES Saeed, QY Liu, GY Tian, B Gao, F Li - Wireless Networks, 2019 - Springer
WSNs are one of the important components in the Internet of Things (IoTs), since they
enable gathering and transmitting of data to the cloud server via the Internet medium …

A lightweight authentication protocol for D2D-enabled IoT systems with privacy

CDM Pham, TK Dang - Pervasive and Mobile Computing, 2021 - Elsevier
Abstract The Internet of Things (IoT) has become a popular trend in the technology industry
with the huge benefits it brings by enabling heterogeneous interconnected devices and …

An improved certificateless mutual authentication and key agreement protocol for cloud-assisted wireless body area networks

P Verma, DS Gupta - Wireless Personal Communications, 2023 - Springer
This paper is based on the work published by Cheng et al. in the journal Mobile Networks
and Applications. Cheng et al. proposed a certificateless authentication and key agreement …