CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN
暂无分享,去创建一个
[1] Tarik Taleb,et al. A green strategic activity scheduling for UAV networks: A sub-modular game perspective , 2016, IEEE Communications Magazine.
[2] Harmanpreet Singh Grover,et al. An efficient anonymous user authentication and key agreement protocol for wireless sensor networks , 2021, Int. J. Commun. Syst..
[3] Mohsen Guizani,et al. Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function , 2020, IEEE Transactions on Vehicular Technology.
[4] Jeroen Delvaux,et al. Key-recovery attacks on various RO PUF constructions via helper data manipulation , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[5] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[6] An Braeken,et al. PUF Based Authentication Protocol for IoT , 2018, Symmetry.
[7] Cheng-Chi Lee,et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.
[8] Yoney Kirsal Ever,et al. Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks , 2019, IEEE Syst. J..
[9] Adamu Murtala Zungeru,et al. Communication protocols for wireless sensor networks: A survey and comparison , 2019, Heliyon.
[10] Ruhul Amin,et al. Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETs , 2021, J. Inf. Secur. Appl..
[11] Debdeep Mukhopadhyay,et al. A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[12] Muhammad Khurram Khan,et al. An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[13] Miodrag Potkonjak,et al. Lightweight secure PUFs , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[14] Kim-Kwang Raymond Choo,et al. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment , 2018, IEEE Journal of Biomedical and Health Informatics.
[15] Xiong Li,et al. Provably secure user authentication and key agreement scheme for wireless sensor networks , 2016, Secur. Commun. Networks.
[16] Marian Margraf,et al. Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance , 2019, IACR Cryptol. ePrint Arch..
[17] Ashok Kumar Das,et al. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks , 2012, J. Netw. Comput. Appl..
[18] Chin-Chen Chang,et al. A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[19] Sourav Mukhopadhyay,et al. A Mutual Authentication Framework for Wireless Medical Sensor Networks , 2017, Journal of Medical Systems.
[20] Guangjie Han,et al. A Comparative Study of Routing Protocols of Heterogeneous Wireless Sensor Networks , 2014, TheScientificWorldJournal.
[21] Prosanta Gope,et al. A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.
[22] Gang Qu,et al. Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security , 2020, IEEE Transactions on Industrial Electronics.
[23] Khalid Alsubhi,et al. A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area Networks , 2020, Wireless Personal Communications.
[24] Qiang Ni,et al. Drone-Aided Communication as a Key Enabler for 5G and Resilient Public Safety Networks , 2018, IEEE Communications Magazine.
[25] Hanif Ullah,et al. 5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases , 2019, IEEE Access.
[26] Jiliang Zhang,et al. Approximation Attacks on Strong PUFs , 2020, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[27] Md. Zakirul Alam Bhuiyan,et al. A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function , 2019, SpaCCS.
[28] Walid Saad,et al. Joint Access and Backhaul Resource Management in Satellite-Drone Networks: A Competitive Market Approach , 2019, IEEE Transactions on Wireless Communications.
[29] Devender Kumar,et al. Cryptanalysis and improvement of mutual authentication protocol for real-time data access in industrial wireless sensor networks , 2020 .
[30] Ashok Kumar Das,et al. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.
[31] Jan Sölter,et al. PUF modeling attacks: An introduction and overview , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[32] Saraju P. Mohanty,et al. Everything You Wanted to Know About PUFs , 2017, IEEE Potentials.
[33] Xiong Li,et al. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.
[34] An Braeken,et al. PUF‐Based Authentication and Key Exchange for Internet of Things , 2020 .