Blockchain-Assisted Cross-Platform Authentication Protocol with Conditional Traceability for Metaverse Environment in Web 3.0 DOI Creative Commons
Garima Thakur,

Deepika Gautam,

Pankaj Kumar

et al.

IEEE Open Journal of the Communications Society, Journal Year: 2024, Volume and Issue: 5, P. 7244 - 7261

Published: Jan. 1, 2024

Language: Английский

A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks DOI
Garima Thakur, Sunil Prajapat, Pankaj Kumar

et al.

Journal of Systems Architecture, Journal Year: 2024, Volume and Issue: 154, P. 103245 - 103245

Published: July 26, 2024

Language: Английский

Citations

11

SC-VDTwinAuth: Smart-Contract Assisted Handover Authentication Protocol for Vehicular Digital Twin Network DOI

Deepika Gautam,

Garima Thakur, Sunil Prajapat

et al.

Vehicular Communications, Journal Year: 2025, Volume and Issue: 53, P. 100890 - 100890

Published: Jan. 30, 2025

Language: Английский

Citations

0

ER-CGKA: Efficient and robust continuous group key agreement scheme with post-compromise forward security for IoV DOI Creative Commons
Guishuang Xu, Xinchun Yin,

Xincheng Li

et al.

PLoS ONE, Journal Year: 2024, Volume and Issue: 19(8), P. e0307867 - e0307867

Published: Aug. 29, 2024

The Internet of Vehicles (IoV) counts for much in advancing intelligent transportation by connecting people, vehicles, infrastructures, and cloud servers (CS). However, the open-access wireless channels within IoV are susceptible to malicious attacks. Therefore, an authentication key agreement protocol becomes essential ensure secure vehicular communications protect vehicle privacy. Nevertheless, although vehicles group compromised, they can still update obtain communication content existing protocols. it is challenging guarantee post-compromise forward security (PCFS). Dynamic rotation a common approach realizing PCFS, which brings heavy computation burden. To address these issues, efficient robust continuous (ER-CGKA) scheme with PCFS designed IoV. propose-and-commit flow employed support asynchronous updates. Besides, cost overhead significantly reduced based on TreeKEM architecture. Furthermore, we adopt threshold mechanism resist collusion attacks enhances ER-CGKA scheme's robustness. Security analysis indicates that proposed satisfies all fundamental requirements achieves PCFS. performance evaluation results show our demonstrates reduction 18.82% (Client) 33.18% (CS) approximately, increase around 55.57% since pseudonyms utilized achieve conditional privacy-preserving. practical.

Language: Английский

Citations

1

Security Analysis and Improvement of Authenticated Key Agreement Protocol for Remote Patient Monitoring IoMT DOI

Deepika Gautam,

Garima Thakur, Mohammad S. Obaidat

et al.

Published: Oct. 16, 2024

Language: Английский

Citations

0

Blockchain-Assisted Cross-Platform Authentication Protocol with Conditional Traceability for Metaverse Environment in Web 3.0 DOI Creative Commons
Garima Thakur,

Deepika Gautam,

Pankaj Kumar

et al.

IEEE Open Journal of the Communications Society, Journal Year: 2024, Volume and Issue: 5, P. 7244 - 7261

Published: Jan. 1, 2024

Language: Английский

Citations

0