Engineering: Recent submissions
Now showing items 1-50 of 1349
-
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks
(Springer Link, 2010)Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected at a time through wireless mesh routers. Since the nodes of every network have different processing power, bandwidth, amount ... -
An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
(ResearchGate, 2017-09)The concepts of Internet of Things (IOT) show that everything in the global network is interconnected and accessible. In IOT environment Wireless Sensor Networks (WSNs) play a very important role because of its ubiquitous ... -
Comment on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
(The Institution of Engineering and Technology, 2020-12)This comment is presented to identify the drawbacks in a recently published scheme SFVCC by Mishra et al.doi:10.1049/iet-its.2019.0250. In this scheme, a malicious adversary may initiate a replay attack and denial ... -
Drone-based secure communication model for goods collection and delivery: a strategic management perspective
(Inderscience Publishers (IEL), 2021)With the advancements in communication and information technologies, the internet of drones (IoD) has become reality. The IoD is gaining rapid popularity and has several applications including drone-based rescue and delivery ... -
Guest editorial of the special issue “remote sensing in water management and hydrology”
(Taylor & Francis, 2021-03)This special issue starts with an article on high seismicity detection, namely “Fluid-Induced High Seismicity in Songliao Basin of China,” co-authored by Sheng et al. (2020). The authors attempt to assess and review the ... -
Blockchain for Fool-Proof E-Voting Systems
(Springer Link, 2022)Blockchain-enabled e-voting system (BEV) is the need of the hour for many organizations and for democracies. With allegations being raised on validity of the voting system and mass protests, e.g., in the USA as well as the ... -
Security, Trust and Privacy for Cloud, Fog and Internet of Things
(Hindawi, 2022-01)Internet of Things (IoT) is a promising networking scenario in the cyber world, bridging physical devices and virtual objects. By considering the limited capacity of smart things, cloud computing is generally applied to ... -
Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication
(Hindawi, 2022-04)Vehicle-to-everything (V2X) communications have recently gained concentration of researchers for both, academia as well as industry. In the V2X system, the information is communicated from vehicle sensors to other vehicles, ... -
Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications
(IEEE Xplore, 2022-08)In the Sixth Generation (6G) mobile system, the importance of security increases even more in the communication system. One of the potential technologies of 6G is the Network in a Box (NIB). The 6G-enabled NIB is a ... -
An Identity-Based Encryption Method for SDN-Enabled Source Routing Systems
(Hindawi, 2022-04)In this study, we consider endpoints communicating over a software-defined networking (SDN)-based architecture using source routing, i.e., packets are routed through a path selected by the packet sender, and we provide a ... -
TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs
(Hindawi, 2022-09)A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the advancement in VANET technology, security threats are increasing rapidly. Mitigation of these threats needs an intelligent ... -
AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation
(IEEE Xplore, 2022-11)The next-generation Internet of vehicles (IoVs) seamlessly connects humans, vehicles, roadside units (RSUs), and service platforms, to improve road safety, enhance transit efficiency, and deliver comfort while conserving ... -
Structure modeling and mutational analysis of gap junction beta 2 (GJB2)
(AJOL, 2012)The genome sequencing accomplishes complete genetic blue prints for hundreds of organisms, including humans. In the current era, we are trying to focus on analyzing, controlling and modifying functions of proteins encoded ... -
Ensuring Minimal Communication Overhead in Low Bandwidth Network File
(Springer Link, 2012)All wireless networks are resource constrained, the battery power, memory and bandwidth are main constraints along with security of information in wireless networks. Running of ordinary file systems on such wireless networks ... -
SF-LAP: Secure M2M Communication in IIoT with a Single-Factor Lightweight Authentication Protocol
(Hindawi, 2022-11)Machine-to-machine communication allows smart devices like sensors, actuators, networks, gateways, and other controllers to communicate with one another. The industrial Internet of things (IIoT) has become a vital component. ... -
A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing
(Hindawi, 2022-11)Public cloud computing has become increasingly popular due to the rapid advancements in communication and networking technology. As a result, it is widely used by businesses, corporations, and other organizations to boost ... -
Architecture, Protocols, and Security in IoV: Taxonomy, Analysis, Challenges, and Solutions
(Hindawi, 2022-10)Internet of Vehicles (IoV) is a multinode network that exchanges information in an open, wireless environment. Various communication activities exist between IoV entities to share important information such as (ID, location, ... -
Further comments on ‘SFVCC: Chaotic map-based security framework for vehicular cloud computing’
(The Institution of Engineering and Technology, 2020-12)By simulating a clogging attack [1–5], an adversary forces a communicating entity to process a forged/replayed authentication request by the adversary impersonating on behalf of a legitimate entity. The clogging attack ... -
A symmetric cryptography based key agreement protocol for distributed cloud computing environment
(ResearchGate, 2021)In literature, many researchers put forward different types of authentication schemes for Distributed Cloud Computing environments. Some of the recently proposed schemes are based on a multi-factor authentication system, ... -
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
(KTU, 2019-06)By simulating a clogging attack [1–5], an adversary forces a communicating entity to process a forged/replayed authentication request by the adversary impersonating on behalf of a legitimate entity. The clogging attack ... -
Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
(KTU, 2017-06)The main contribution of this paper is to analyze a secure passwordauthentication mechanism (SPAM), proposed by Chuang et al. in 2013(IEEE Syst J.). The SPAM was used for designing a secure handover inProxy Mobile IPv6 ... -
Comments and improvements of “HOTA: Handover optimized ticket-based authentication in network-based mobility management”
(IEEE Xplore, 2017-03)Nowadays, various mobile devices are being an inseparable part of our normal life. Mobile users tend to be connected to the Internet seamlessly, which is provided by mobility management protocols. One of the latest mobility ... -
Efficient neighbour feedback based trusted multi authenticated node routing model for secure data transmission
(MDPI, 2021-12)The Mobile Ad Hoc Network (MANET) is a network that does not have a fixed infrastructure. Migratory routes and related hosts that are connected via wireless networks self-configure it. Routers and hosts are free to wander, ... -
SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes
(Hindawi, 2022-02)Being one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the ... -
A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System
(IEEE Xplore, 2022-08)Wireless Body Area Network (WBAN) is a vital application of the Internet of Things (IoT) that plays a significant role in gathering a patient's healthcare information. This collected data helps special professionals like ... -
Performance analysis of secure communications over correlated slow‐fading additive white Gaussian noise channels
(Wiley Online Library, 2019-08)The broadcast nature of communications in wireless communication networks makes it vulnerable to some attacks, particularly eavesdrop attack. Hence, information security can have a key role to protect privacy and avoid ... -
Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’
(Wiley Online Library, 2021-09)This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric ... -
An efficient and secure design of multi-server authenticated key agreement protocol
(Springer Link, 2018-09)Multi-server authentication, being a crucial component of remote communication, provides the ease of one-time registration to users from a centralized registration authority. Therefore, the users could avail the offered ... -
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
(ELSEVIER, 2022-11)Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers vehicle-to-device, vehicle-to-infrastructure, and ... -
A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems
(Hindawi, 2021-11)As a part of the smart city revolution, crowd management is an emerging trend and it can enhance the quality of life. Unmanned ariel vehicles (UAVs) can help in making the crowd management process more efficient and more ... -
An Improved Authentication Scheme for Digital Rights Management System
(Hindawi, 2022-01)With the increasing number and popularity of digital content, the management of digital access rights has become an utmost important field. Through digital rights management systems (DRM-S), access to digital contents can ... -
A low-cost privacy preserving user access in mobile edge computing framework
(ELSEVIER, 2022-03)The computational offloading from conventional cloud datacenter towards edge devices sprouted a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in ... -
A seamless anonymous authentication protocol for mobile edge computing infrastructure
(ELSEVIER, 2022-03)Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities across the scope of wireless network. In MEC environment, MEC servers along with the computing and storage capabilities are ... -
On the security of an authentication scheme for smart metering infrastructure
(IEEE Xplore, 2020-12)Recently, in 2019, Kumar et al. (IEEE Transactions on Smart Grid 10.4 (2018): 4349-4359) proposed an ECC based lightweight authentication and Key agreement scheme (LAKA) to secure the communication among a smart meter (SM) ... -
A Physical Capture Resistant Authentication Scheme for the Internet of Drones
(IEEE Xplore, 2021-12)The internet of Drones (IoD) can encompass many essential services, including surveillance and emergency/rescue operations. While IoD is becomin popular and experiencing a rapid usage increase, privacy and security are the ... -
An efficient and provably secure certificateless protocol for industrial Internet of Things
(IEEE Xplore, 2022-03)The Internet of Things (IoT) has a wide range of applications that influence the life of people expeditiously. In recent years, IoT becomes an emerging technology in a number of fields. Different devices with divergent ... -
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
(Korean Society for Internet Information, 2018)The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to ... -
A secure mutual authenticated key agreement of user with multiple servers for critical systems
(Springer Link, 2018-05)Recent technological advances in almost all critical systems’ domains have led to an explosive growth of multimedia big data. Those advances encompass the ever increasing innovative digital and remote mobile devices being ... -
A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System
(IEEE Xplore, 2021-10)As digital content transmission through the internet is convenient and quick, so the outspread of digital content is very high. However, along with this incredible speed and ease, current communication technologies and ... -
TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments
(Hindawi, 2021-12)In smart cities, common infrastructures are merged and integrated with various components of information communication and technology (ICT) to be coordinated and controlled. Drones (unmanned aerial vehicles) are amongst ... -
RapidAuth: Fast Authentication for Sustainable IoT
(Springer Link, 2021)The exponential growth in the number of Internet of Things (IoT) devices, the sensitive nature of data they produce, and the simple nature of these devices makes IoT systems vulnerable to a wide range cyber-threats. Physical ... -
Correctness of an Authentication Scheme for Managing Demand Response in Smart Grid
(Taylor & Francis, 2020-10)In recent years, many efforts are seen to secure the smart grid environment through various methods. However, a large number of such methods were proved insecure, whereas, some other methods are heavy weight due to underlying ... -
Analyzing and evaluating the energy efficiency based on multi-5G small cells with a mm-waves in the next generation cellular networks.
(iaes, 2020-08)This paper evaluates the impact of multi-5G small cell systems on the energy efficiency (EE) in a Fifth Generation (5G) of cellular networks. Both the proposed model and the analysis of the EE in this study take into account ... -
An improved one-to-many authentication scheme based on bilinear pairings with provable security for mobile pay-TV systems
(Springer Link, 2017-06)In 2012, Wang and Qin proposed an authentication mechanism in order to get access control for mobile pay-TV organization to enhance the Sun and Leu’s technique. Wang and Qin declared that their technique satisfies the ... -
Attacks and solutions for a two-factor authentication protocol for wireless body area networks
(Hindawi, 2021)As an extension of the 4G system, 5G is a new generation of broadband mobile communication with high speed, low latency, and large connection characteristics. It solves the problem of human-to-thing and thing-to-thing ... -
A lightweight and secure two factor anonymous authentication protocol for Global Mobility Networks
(Public Library of Science, 2018-04)Global Mobility Networks(GLOMONETs) in wireless communication permits the global roaming services that enable a user to leverage the mobile services in any foreign country. Technological growth in wireless communication ... -
A secure and improved multi server authentication protocol using fuzzy commitment
(Springer Link, 2021-05)The advancement in communication and computation technologies has paved a way for connecting large number of heterogeneous devices to offer specified services. Still, the advantages of this advancement are not realized ... -
ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment
(Springer Link, 2020-09)In 2019, Banerjee et al. (IEEE Int Things J 6(5):8739–8752, 2019; https://doi.org/10.1109/JIOT.2019.2931372) proposed an authenticated key agreement scheme to facilitate the session establishment resulting into a session ... -
Comments on" A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs"
(IEEE Xplore, 2022-04)Very recently in 2021, Nandy et al. proposed an authentication scheme (IEEE Sensors Journal, 21(18), pp. 20998-21011, DOI: 10.1109/JSEN.2021.3097172, 2021) using elliptic curve cryptography and symmetric key-based hash ... -
A provably secure and lightweight mutual authentication protocol in fog-enabled social Internet of vehicles
(SAGE Publications, 2022-06)The Internet of vehicles technology has developed rapidly in recent years and has become increasingly important. The social Internet of vehicles provides better resources and services for the development of the Internet ...