|
[1] S. Abughazalah, K. Markantonakis, and K. Mayes, “Secure improved cloud-based RFID authentication protocol,” Lecture Notes in Computer Science, Vol. 8872, Springer, Cham, Switzerland, pp. 147-164, 2015. [2] K. Fan, W. Jiang, H. Li and Y. Yang, “Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV,” Journal of the Franklin Institute, https://doi.org/10.1016/j.jfranklin.2019.02.023, 2019. [3] M.S. Farash, M. Turkanović, S. Kumari and M. Hölbl, “An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment,” Ad Hoc Networks, Vol. 36, pp. 152-176, 2016. [4] R. Amin, SK Hafizul Islam, G.P. Biswas, M. K. Khan, L. Leng and N. Kumar, “Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks,” Computer Networks, Vol. 101, pp. 42-62, 2016. [5] W. Li and P. Wang, “Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction,” Future Generation Computer Systems, Vol. 101, pp. 694-708, 2019. [6] K. Fan, W. Jiang, H. Li and Y. Yang, “Lightweight RFID protocol for medical privacy protection in IoT,” IEEE Transactions on Industrial Informatics, Vol. 14, No. 4, pp. 1656-1665, 2018. [7] S. F. Aghilia, H. Mala, P. Kaliyar and M. Conti, “SecLAP: Secure and lightweight RFID authentication protocol for Medical IoT,” Future Generation Computer Systems, Vol. 101, No.01, pp. 621-634, 2019. [8] V. Rao and K.V Prema, “Light-weight hashing method for user authentication in Internet-of-Things,” Ad Hoc Networks, Vol. 89, pp. 97-106, 2019. [9] J.-P. Aumasson, S. Neves , Z. Wilcox-O’Hearn and C. Winnerlein, “BLAKE2: simpler, smaller, fast as MD5,” Proceedings of International Conference on Applied Cryptography and Network Security, Springer-Verlag Berlin Heidelberg, pp. 119-135, 2013 . [10] J.-P. Aumasson and L. Henzen, W. Meier, and R.C.-W. Phan, “SHA-3 proposal BLAKE,” Submission to National Institute of Standards and Technology, 2010. [11] Y. F. Chang, S. J. Huang and W. L. Tai, “Comments on light-weight hashing method for user authentication in Internet-of-Things,” Proceedings of IAM 2020 Winter, Sapporo, Japan, pp. 353-362, 2020.
[12] J. Won, S.-H. Seo and E. Bertino, “Certificateless cryptographic protocols for efficient drone-based smart city applications,” IEEE Access, Vol. 5, pp. 3721-3749, 2017. [13] B. Semal, K. Markantonakis and R. N. Akram, “A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks,” Proceedings of 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), pp. 1-8, 2018. [14] J. H. Cheon, K. Han, S.-M. Hong, H. J. Kim, J. Kim, S. Kim, H. Seo, H. Shim and Y. Song, “Toward a secure drone system: flying with real-time homomorphic authenticated encryption,” IEEE Access, Vol. 6, pp. 24325-24339, 2018. [15] S. H. Alsamhi, O. Ma, M. S. Ansari and F. A. Almalki, “ Survey on collaborative smart drones and internet of things for improving smartness of smart cities,” IEEE Access, Vol. 7, pp. 128125-128152, 2019. [16] G. Choudhary, V. Sharma and I. You, “Sustainable and secure trajectories for the military internet of drones (IoD) through an efficient medium access control (MAC) protocol,” Computers & Electrical Engineering, Vol. 74, pp. 59-73, 2019. [17] Y. Zhang, D. He, L. Li and B. Chen, “A lightweight authentication and key agreement scheme for internet of drones,” Computer Communications, Vol. 154, pp. 455-464, 2020.
|