Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    CD-AKA-IoV: A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle

    Tsu-Yang Wu1,2, Haozhi Wu2, Maoxin Tang3, Saru Kumari4, Chien-Ming Chen1,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1715-1732, 2025, DOI:10.32604/cmc.2025.065560 - 29 August 2025

    Abstract With the rapid development and widespread adoption of Internet of Things (IoT) technology, the innovative concept of the Internet of Vehicles (IoV) has emerged, ushering in a new era of intelligent transportation. Since vehicles are mobile entities, they move across different domains and need to communicate with the Roadside Unit (RSU) in various regions. However, open environments are highly susceptible to becoming targets for attackers, posing significant risks of malicious attacks. Therefore, it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs, particularly in scenarios where More >

  • Open Access

    ARTICLE

    Light-Weighted Mutual Authentication and Key Agreement in V2N VANET

    Yanan Liu1, Lei Cao1,*, Zheng Zhang1,*, Ge Li2, Shuo Qiu1, Suhao Wang1

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4997-5019, 2025, DOI:10.32604/cmc.2025.066836 - 30 July 2025

    Abstract As the adoption of Vehicular Ad-hoc Networks (VANETs) grows, ensuring secure communication between smart vehicles and remote application servers (APPs) has become a critical challenge. While existing solutions focus on various aspects of security, gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments. This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function (PUF) for authentication and key agreement, offering a comprehensive solution to the security challenges in VANETs. The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs, ensuring the confidentiality and integrity of vehicle-to-network… More >

  • Open Access

    ARTICLE

    Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem

    Guojun Wang1,2, Qi Liu3,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4471-4488, 2024, DOI:10.32604/cmc.2024.047669 - 26 March 2024

    Abstract With the rapid advancement in exploring perceptual interactions and digital twins, metaverse technology has emerged to transcend the constraints of space-time and reality, facilitating remote AI-based collaboration. In this dynamic metasystem environment, frequent information exchanges necessitate robust security measures, with Authentication and Key Agreement (AKA) serving as the primary line of defense to ensure communication security. However, traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse. To address this challenge and enable nearly latency-free interactions, a novel low-latency AKA protocol based on chaotic maps is proposed. This… More >

  • Open Access

    ARTICLE

    Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment

    Tsu-Yang Wu1, Qian Meng1, Lei Yang1, Saru Kumari2, Matin Pirouz3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 317-341, 2023, DOI:10.32604/cmes.2022.019595 - 24 August 2022

    Abstract The development of the Internet of Things has facilitated the rapid development of various industries. With the improvement in people’s living standards, people’s health requirements are steadily improving. However, owing to the scarcity of medical and health care resources in some areas, the demand for remote surgery has gradually increased. In this paper, we investigate remote surgery in the healthcare environment. Surgeons can operate robotic arms to perform remote surgery for patients, which substantially facilitates successful surgeries and saves lives. Recently, Kamil et al. proposed a secure protocol for surgery in the healthcare environment. However, More >

  • Open Access

    Preserving Privacy of User Identity Based on Pseudonym Variable in 5G

    Mamoon M. Saeed1, Mohammad Kamrul Hasan2,*, Rosilah Hassan2 , Rania Mokhtar3 , Rashid A. Saeed3,4, Elsadig Saeid1, Manoj Gupta5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5551-5568, 2022, DOI:10.32604/cmc.2022.017338 - 11 October 2021

    Abstract

    The fifth generation (5G) system is the forthcoming generation of the mobile communication system. It has numerous additional features and offers an extensively high data rate, more capacity, and low latency. However, these features and applications have many problems and issues in terms of security, which has become a great challenge in the telecommunication industry. This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity, which randomly changes and does not use the permanent identity between the user

    More >

  • Open Access

    ARTICLE

    An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy

    Seyed Amin Hosseini Seno1, Mahdi Nikooghadam1, Rahmat Budiarto2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3495-3512, 2021, DOI:10.32604/cmc.2021.019051 - 24 August 2021

    Abstract Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers. In this system, service providers consider user authentication as a critical requirement. To address this crucial requirement, various types of validation and key agreement protocols have been employed. The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws. This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an… More >

  • Open Access

    ARTICLE

    Design of a Mutual Authentication and Key Agreement Protocol for WBANs

    Xiangwei Meng, Jianbo Xu*, Xiaohe Wu, Zhechong Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 107-114, 2020, DOI:10.32604/jihpp.2020.09901 - 18 December 2020

    Abstract Please WBANs are a sensor network for detection and collection of sensitive data to the human body, which is lightweight and mobile. WBANs transmit sensitive and significant messages through the public channel, which makes it easy for an attacker to eavesdrop and modify the messages, thus posing a severe threat to the security of the messages. Therefore, it is essential to put in place authentication and key agreement between different communication nodes in WBANs. In this paper, a lightweight and secure authenticated key agreement protocol in wireless body area networks is designed. It is More >

Displaying 1-10 on page 1 of 7. Per Page