Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    CD-AKA-IoV: A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle

    Tsu-Yang Wu1,2, Haozhi Wu2, Maoxin Tang3, Saru Kumari4, Chien-Ming Chen1,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1715-1732, 2025, DOI:10.32604/cmc.2025.065560 - 29 August 2025

    Abstract With the rapid development and widespread adoption of Internet of Things (IoT) technology, the innovative concept of the Internet of Vehicles (IoV) has emerged, ushering in a new era of intelligent transportation. Since vehicles are mobile entities, they move across different domains and need to communicate with the Roadside Unit (RSU) in various regions. However, open environments are highly susceptible to becoming targets for attackers, posing significant risks of malicious attacks. Therefore, it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs, particularly in scenarios where More >

  • Open Access

    ARTICLE

    Light-Weighted Mutual Authentication and Key Agreement in V2N VANET

    Yanan Liu1, Lei Cao1,*, Zheng Zhang1,*, Ge Li2, Shuo Qiu1, Suhao Wang1

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4997-5019, 2025, DOI:10.32604/cmc.2025.066836 - 30 July 2025

    Abstract As the adoption of Vehicular Ad-hoc Networks (VANETs) grows, ensuring secure communication between smart vehicles and remote application servers (APPs) has become a critical challenge. While existing solutions focus on various aspects of security, gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments. This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function (PUF) for authentication and key agreement, offering a comprehensive solution to the security challenges in VANETs. The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs, ensuring the confidentiality and integrity of vehicle-to-network… More >

  • Open Access

    ARTICLE

    Unleashing the Potential of Metaverse in Social IoV: An Authentication Protocol Based on Blockchain

    Tsu-Yang Wu1,2,3, Haozhi Wu3, Maoxin Tang1,2, Saru Kumari4, Chien-Ming Chen1,2,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3175-3192, 2025, DOI:10.32604/cmc.2025.065717 - 03 July 2025

    Abstract As a model for the next generation of the Internet, the metaverse—a fully immersive, hyper-temporal virtual shared space—is transitioning from imagination to reality. At present, the metaverse has been widely applied in a variety of fields, including education, social entertainment, Internet of vehicles (IoV), healthcare, and virtual tours. In IoVs, researchers primarily focus on using the metaverse to improve the traffic safety of vehicles, while paying limited attention to passengers’ social needs. At the same time, Social Internet of Vehicles (SIoV) introduces the concept of social networks in IoV to provide better resources and services… More >

  • Open Access

    ARTICLE

    Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem

    Guojun Wang1,2, Qi Liu3,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4471-4488, 2024, DOI:10.32604/cmc.2024.047669 - 26 March 2024

    Abstract With the rapid advancement in exploring perceptual interactions and digital twins, metaverse technology has emerged to transcend the constraints of space-time and reality, facilitating remote AI-based collaboration. In this dynamic metasystem environment, frequent information exchanges necessitate robust security measures, with Authentication and Key Agreement (AKA) serving as the primary line of defense to ensure communication security. However, traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse. To address this challenge and enable nearly latency-free interactions, a novel low-latency AKA protocol based on chaotic maps is proposed. This… More >

  • Open Access

    ARTICLE

    Efficient Certificateless Authenticated Key Agreement for Blockchain-Enabled Internet of Medical Things

    Chaoyang Li1, Yanbu Guo1, Mianxiong Dong2,*, Gang Xu3, Xiu-Bo Chen4, Jian Li4, Kaoru Ota2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2043-2059, 2023, DOI:10.32604/cmc.2023.033670 - 06 February 2023

    Abstract Internet of Medical Things (IoMT) plays an essential role in collecting and managing personal medical data. In recent years, blockchain technology has put power in traditional IoMT systems for data sharing between different medical institutions and improved the utilization of medical data. However, some problems in the information transfer process between wireless medical devices and mobile medical apps, such as information leakage and privacy disclosure. This paper first designs a cross-device key agreement model for blockchain-enabled IoMT. This model can establish a key agreement mechanism for secure medical data sharing. Meanwhile, a certificateless authenticated key… More >

  • Open Access

    ARTICLE

    Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment

    Tsu-Yang Wu1, Qian Meng1, Lei Yang1, Saru Kumari2, Matin Pirouz3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 317-341, 2023, DOI:10.32604/cmes.2022.019595 - 24 August 2022

    Abstract The development of the Internet of Things has facilitated the rapid development of various industries. With the improvement in people’s living standards, people’s health requirements are steadily improving. However, owing to the scarcity of medical and health care resources in some areas, the demand for remote surgery has gradually increased. In this paper, we investigate remote surgery in the healthcare environment. Surgeons can operate robotic arms to perform remote surgery for patients, which substantially facilitates successful surgeries and saves lives. Recently, Kamil et al. proposed a secure protocol for surgery in the healthcare environment. However, More >

  • Open Access

    ARTICLE

    Improved Multi-party Quantum Key Agreement with Four-qubit Cluster States

    Hussein Abulkasim1,*, Eatedal Alabdulkreem2, Safwat Hamad3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 225-232, 2022, DOI:10.32604/cmc.2022.025727 - 18 May 2022

    Abstract Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks. Recently, Liu et al. (Quantum Information Processing 18(8):1-10, 2019) proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed. The aim of their protocol is to agree on a shared secret key among multiple remote participants. Liu et al. employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key. In addition, Liu et al.'s protocol guarantees that each participant makes an equal More >

  • Open Access

    ARTICLE

    An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

    Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Parkash Tambare5, Adel R. Alharbi6, Iqtadar Hussain7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1373-1389, 2022, DOI:10.32604/cmc.2022.024996 - 24 February 2022

    Abstract The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of More >

  • Open Access

    ARTICLE

    Robust Authentication and Session Key Agreement Protocol for Satellite Communications

    Somayeh Soltani1, Seyed Amin Hosseini Seno1, Juli Rejito2, Rahmat Budiarto3,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5891-5910, 2022, DOI:10.32604/cmc.2022.023697 - 14 January 2022

    Abstract Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities.… More >

  • Open Access

    ARTICLE

    Improved Key Agreement Based Kerberos Protocol for M-Health Security

    P. Thirumoorthy1,*, K. S. Bhuvaneshwari2, C. Kamalanathan3, P. Sunita3, E. Prabhu4, S. Maheswaran5

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 577-587, 2022, DOI:10.32604/csse.2022.021717 - 04 January 2022

    Abstract The development of wireless sensor network with Internet of Things (IoT) predicts various applications in the field of healthcare and cloud computing. This can give promising results on mobile health care (M-health) and Telecare medicine information systems. M-health system on cloud Internet of Things (IoT) through wireless sensor network (WSN) becomes the rising research for the need of modern society. Sensor devices attached to the patients’ body which is connected to the mobile device can ease the medical services. Security is the key connect for optimal performance of the m-health system that share the data More >

Displaying 1-10 on page 1 of 17. Per Page