Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem

    Guojun Wang1,2, Qi Liu3,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4471-4488, 2024, DOI:10.32604/cmc.2024.047669 - 26 March 2024

    Abstract With the rapid advancement in exploring perceptual interactions and digital twins, metaverse technology has emerged to transcend the constraints of space-time and reality, facilitating remote AI-based collaboration. In this dynamic metasystem environment, frequent information exchanges necessitate robust security measures, with Authentication and Key Agreement (AKA) serving as the primary line of defense to ensure communication security. However, traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse. To address this challenge and enable nearly latency-free interactions, a novel low-latency AKA protocol based on chaotic maps is proposed. This… More >

  • Open Access

    ARTICLE

    Amassing the Security: An Enhanced Authentication and Key Agreement Protocol for Remote Surgery in Healthcare Environment

    Tsu-Yang Wu1, Qian Meng1, Lei Yang1, Saru Kumari2, Matin Pirouz3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 317-341, 2023, DOI:10.32604/cmes.2022.019595 - 24 August 2022

    Abstract The development of the Internet of Things has facilitated the rapid development of various industries. With the improvement in people’s living standards, people’s health requirements are steadily improving. However, owing to the scarcity of medical and health care resources in some areas, the demand for remote surgery has gradually increased. In this paper, we investigate remote surgery in the healthcare environment. Surgeons can operate robotic arms to perform remote surgery for patients, which substantially facilitates successful surgeries and saves lives. Recently, Kamil et al. proposed a secure protocol for surgery in the healthcare environment. However, More >

  • Open Access

    ARTICLE

    Robust Authentication and Session Key Agreement Protocol for Satellite Communications

    Somayeh Soltani1, Seyed Amin Hosseini Seno1, Juli Rejito2, Rahmat Budiarto3,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5891-5910, 2022, DOI:10.32604/cmc.2022.023697 - 14 January 2022

    Abstract Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities.… More >

  • Open Access

    ARTICLE

    An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy

    Seyed Amin Hosseini Seno1, Mahdi Nikooghadam1, Rahmat Budiarto2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3495-3512, 2021, DOI:10.32604/cmc.2021.019051 - 24 August 2021

    Abstract Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers. In this system, service providers consider user authentication as a critical requirement. To address this crucial requirement, various types of validation and key agreement protocols have been employed. The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws. This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an… More >

  • Open Access

    ARTICLE

    Design of a Mutual Authentication and Key Agreement Protocol for WBANs

    Xiangwei Meng, Jianbo Xu*, Xiaohe Wu, Zhechong Wang

    Journal of Information Hiding and Privacy Protection, Vol.2, No.3, pp. 107-114, 2020, DOI:10.32604/jihpp.2020.09901 - 18 December 2020

    Abstract Please WBANs are a sensor network for detection and collection of sensitive data to the human body, which is lightweight and mobile. WBANs transmit sensitive and significant messages through the public channel, which makes it easy for an attacker to eavesdrop and modify the messages, thus posing a severe threat to the security of the messages. Therefore, it is essential to put in place authentication and key agreement between different communication nodes in WBANs. In this paper, a lightweight and secure authenticated key agreement protocol in wireless body area networks is designed. It is More >

Displaying 1-10 on page 1 of 5. Per Page