Blockchain-Assisted Cross-Platform Authentication Protocol with Conditional Traceability for Metaverse Environment in Web 3.0 DOI Creative Commons
Garima Thakur,

Deepika Gautam,

Pankaj Kumar

и другие.

IEEE Open Journal of the Communications Society, Год журнала: 2024, Номер 5, С. 7244 - 7261

Опубликована: Янв. 1, 2024

Язык: Английский

A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks DOI
Garima Thakur, Sunil Prajapat, Pankaj Kumar

и другие.

Journal of Systems Architecture, Год журнала: 2024, Номер 154, С. 103245 - 103245

Опубликована: Июль 26, 2024

Язык: Английский

Процитировано

11

SC-VDTwinAuth: Smart-Contract Assisted Handover Authentication Protocol for Vehicular Digital Twin Network DOI

Deepika Gautam,

Garima Thakur, Sunil Prajapat

и другие.

Vehicular Communications, Год журнала: 2025, Номер 53, С. 100890 - 100890

Опубликована: Янв. 30, 2025

Язык: Английский

Процитировано

0

ER-CGKA: Efficient and robust continuous group key agreement scheme with post-compromise forward security for IoV DOI Creative Commons
Guishuang Xu, Xinchun Yin,

Xincheng Li

и другие.

PLoS ONE, Год журнала: 2024, Номер 19(8), С. e0307867 - e0307867

Опубликована: Авг. 29, 2024

The Internet of Vehicles (IoV) counts for much in advancing intelligent transportation by connecting people, vehicles, infrastructures, and cloud servers (CS). However, the open-access wireless channels within IoV are susceptible to malicious attacks. Therefore, an authentication key agreement protocol becomes essential ensure secure vehicular communications protect vehicle privacy. Nevertheless, although vehicles group compromised, they can still update obtain communication content existing protocols. it is challenging guarantee post-compromise forward security (PCFS). Dynamic rotation a common approach realizing PCFS, which brings heavy computation burden. To address these issues, efficient robust continuous (ER-CGKA) scheme with PCFS designed IoV. propose-and-commit flow employed support asynchronous updates. Besides, cost overhead significantly reduced based on TreeKEM architecture. Furthermore, we adopt threshold mechanism resist collusion attacks enhances ER-CGKA scheme's robustness. Security analysis indicates that proposed satisfies all fundamental requirements achieves PCFS. performance evaluation results show our demonstrates reduction 18.82% (Client) 33.18% (CS) approximately, increase around 55.57% since pseudonyms utilized achieve conditional privacy-preserving. practical.

Язык: Английский

Процитировано

1

Security Analysis and Improvement of Authenticated Key Agreement Protocol for Remote Patient Monitoring IoMT DOI

Deepika Gautam,

Garima Thakur, Mohammad S. Obaidat

и другие.

Опубликована: Окт. 16, 2024

Язык: Английский

Процитировано

0

Blockchain-Assisted Cross-Platform Authentication Protocol with Conditional Traceability for Metaverse Environment in Web 3.0 DOI Creative Commons
Garima Thakur,

Deepika Gautam,

Pankaj Kumar

и другие.

IEEE Open Journal of the Communications Society, Год журнала: 2024, Номер 5, С. 7244 - 7261

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

0