Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System

    Bander Alzahrani1, Ahmed Barnawi1, Azeem Irshad2, Areej Alhothali1, Reem Alotaibi1, Muhammad Shafiq3,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6141-6158, 2022, DOI:10.32604/cmc.2022.020774 - 11 October 2021

    Abstract Unmanned aerial vehicles (UAVs) have recently attracted widespread attention in civil and commercial applications. For example, UAVs (or drone) technology is increasingly used in crowd monitoring solutions due to its wider air footprint and the ability to capture data in real time. However, due to the open atmosphere, drones can easily be lost or captured by attackers when reporting information to the crowd management center. In addition, the attackers may initiate malicious detection to disrupt the crowd-sensing communication network. Therefore, security and privacy are one of the most significant challenges faced by drones or the… More >

  • Open Access

    Preserving Privacy of User Identity Based on Pseudonym Variable in 5G

    Mamoon M. Saeed1, Mohammad Kamrul Hasan2,*, Rosilah Hassan2 , Rania Mokhtar3 , Rashid A. Saeed3,4, Elsadig Saeid1, Manoj Gupta5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5551-5568, 2022, DOI:10.32604/cmc.2022.017338 - 11 October 2021

    Abstract

    The fifth generation (5G) system is the forthcoming generation of the mobile communication system. It has numerous additional features and offers an extensively high data rate, more capacity, and low latency. However, these features and applications have many problems and issues in terms of security, which has become a great challenge in the telecommunication industry. This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity, which randomly changes and does not use the permanent identity between the user

    More >

  • Open Access

    ARTICLE

    Authentication in Wireless Body Area Network: Taxonomy and Open Challenges

    Abdullah M. Almuhaideb, Kawther S. Alqudaihi*

    Journal on Internet of Things, Vol.3, No.4, pp. 159-182, 2021, DOI:10.32604/jiot.2021.018088 - 30 December 2021

    Abstract Wearable body area network (WBAN) aids the communication between the health providers and patients by supporting health monitoring services. It assists the users to maintain their health status records by collecting the body signals and transmitting them for further processing measurements. However, sensor data are publicly transferred through insecure network that facilitates the attacker malicious acts like performing masquerading attack, man in the middle, and snooping. Several authentication techniques were suggested to levitate the security of the communication channels to preserve the user data from exposure. Moreover, authentication schemes aid plenty of security issues related… More >

  • Open Access

    ARTICLE

    An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy

    Seyed Amin Hosseini Seno1, Mahdi Nikooghadam1, Rahmat Budiarto2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3495-3512, 2021, DOI:10.32604/cmc.2021.019051 - 24 August 2021

    Abstract Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers. In this system, service providers consider user authentication as a critical requirement. To address this crucial requirement, various types of validation and key agreement protocols have been employed. The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws. This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an… More >

  • Open Access

    ARTICLE

    Design of a Mutual Authentication and Key Agreement Protocol for WBANs

    Xiangwei Meng, Jianbo Xu*, Xiaohe Wu, Zhechong Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 107-114, 2020, DOI:10.32604/jihpp.2020.09901 - 18 December 2020

    Abstract Please WBANs are a sensor network for detection and collection of sensitive data to the human body, which is lightweight and mobile. WBANs transmit sensitive and significant messages through the public channel, which makes it easy for an attacker to eavesdrop and modify the messages, thus posing a severe threat to the security of the messages. Therefore, it is essential to put in place authentication and key agreement between different communication nodes in WBANs. In this paper, a lightweight and secure authenticated key agreement protocol in wireless body area networks is designed. It is More >

  • Open Access

    ARTICLE

    Multiparty Quantum Key Agreement With Strong Fairness Property

    Vankamamidi S. Naresh1,∗, Sivaranjani Reddi2

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 457-465, 2020, DOI:10.32604/csse.2020.35.457

    Abstract Multiparty Key Agreement (MKA) is the backbone for secure multiparty communication. Although numerous efficient MKA-cryptosystems are available in the classical field, their security relies on the assumption that some computational issues are infeasible. To overcome this dependency, a new area, quantum cryptography, evolves to support key agreement among two or more participants securely. In this paper, first, we present a two-part quantum key agreement with Strong Fairness Property (SFP) and extends it to a Multiparty Quantum Key Agreement (MQKA) protocol. In the first round of proposed MQKA, a participant will act as a group controller… More >

  • Open Access

    ARTICLE

    A Secure Three-Factor Authenticated Key Agreement Scheme for Multi-Server Environment

    Meichen Xia1, *, Shiliang Li1,, Liu Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1673-1689, 2020, DOI:10.32604/cmc.2020.010177 - 30 June 2020

    Abstract Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years. However, traditional authenticated key agreement schemes in the single-server environment are not suitable for the multi-server environment because the user has to register on each server when he/she wishes to log in various servers for different service. Moreover, it is unreasonable to consider all servers are trusted since the server in a multi-server environment may be a semi-trusted party. In order to overcome these difficulties, we designed a secure threefactor multi-server authenticated key agreement protocol based on elliptic More >

Displaying 11-20 on page 2 of 17. Per Page