Search Results - "Shamshad, Salman"
-
1
A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics
Published in IEEE transactions on consumer electronics (01-02-2024)“…The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry…”
Get full text
Journal Article -
2
A Provably Secure Mobile User Authentication Scheme for Big Data Collection in IoT-Enabled Maritime Intelligent Transportation System
Published in IEEE transactions on intelligent transportation systems (01-02-2023)“…The emergence of contemporary technologies like cloud computing and the Internet of Things (IoT) has revolutionized the trends in the cyber world to serve…”
Get full text
Journal Article -
3
Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application With Blockchain-Based Authentication
Published in IEEE transactions on consumer electronics (01-02-2024)“…The development of the industrial Internet of Things and smart grid networks has emphasized the importance of secure smart grid communication for the future of…”
Get full text
Journal Article -
4
An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network
Published in IEEE transactions on intelligent transportation systems (01-09-2023)“…The popularity of vehicles promotes the evolution of smart cities. This development makes vehicular ad-hoc network (VANET) a widely used inter-vehicular…”
Get full text
Journal Article -
5
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System
Published in IEEE transactions on intelligent transportation systems (01-12-2023)“…The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime Transportation Systems (MTS). Though, it becomes challenging for the…”
Get full text
Journal Article -
6
Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET
Published in IEEE transactions on consumer electronics (01-02-2024)“…Globally, the development of Intelligent Cyber-Physical Transportation Systems (ICTS) aims to tackle several challenges, including reducing traffic accidents…”
Get full text
Journal Article -
7
An Identity Based Authentication Protocol for Smart Grid Environment Using Physical Uncloneable Function
Published in IEEE transactions on smart grid (01-09-2021)“…Smart grid plays an important role in managing demand response management in modern smart city using Information and Communication Technologies (ICTs). In…”
Get full text
Journal Article -
8
Security Analysis on "A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems"
Published in IEEE systems journal (01-12-2021)“…The Internet of Things (IoT) facilitates different devices and objects to get connected with the Internet. This connectivity helps to switch data via various…”
Get full text
Journal Article -
9
A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System
Published in IEEE transactions on industrial informatics (01-02-2023)“…Wireless Body Area Network (WBAN) is a vital application of the Internet of Things (IoT) that plays a significant role in gathering a patient's healthcare…”
Get full text
Journal Article -
10
A Secure and Lightweight Drones-Access Protocol for Smart City Surveillance
Published in IEEE transactions on intelligent transportation systems (01-10-2022)“…The rising popularity of ICT and the Internet has enabled Unmanned Aerial Vehicle (UAV) to offer advantageous assistance to Vehicular Ad-hoc Network (VANET),…”
Get full text
Journal Article -
11
Comments on “A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things”
Published in Wireless personal communications (01-05-2020)“…The Internet of Things (IoT) introduces a novel model for the future internet that aims to offer communication between numerous interactive objects via…”
Get full text
Journal Article -
12
A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices
Published in IEEE transactions on consumer electronics (01-11-2020)“…Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to…”
Get full text
Journal Article -
13
Comments on "Insider Attack Protection: Lightweight Password-Based Authentication Techniques Using ECC"
Published in IEEE systems journal (01-03-2021)“…The radical progress in web services has drained more attraction towards escalating the security of several applications that serve and interact with the…”
Get full text
Journal Article -
14
A Provably Secure and Lightweight Access Control Protocol for EI-based Vehicle to Grid Environment
Published in IEEE internet of things journal (15-09-2023)“…The Energy Internet (EI) presents a novel paradigm for renewable energy distribution that utilizes communication and computing technologies to revolutionize…”
Get full text
Journal Article -
15
Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment
Published in IEEE transactions on smart grid (01-11-2021)“…In this paper, we introduce a robust authentication protocol for Vehicle-to-Grid (V2G) communication through lightweight and secure cryptographic primitives…”
Get full text
Journal Article -
16
An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber-Physical Systems
Published in IEEE internet of things journal (01-04-2022)“…Industry 5.0 is the automation, digitization, and data communication of the industrial procedure that comprises industrial cyber-physical systems (I-CPSs),…”
Get full text
Journal Article -
17
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing
Published in Wireless personal communications (01-05-2022)“…With the rapidly growing user experience and traffic growth requirements in the Mobile Edge Computing (MEC) environment, the conventional security protocols…”
Get full text
Journal Article -
18
Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication"
Published in IEEE systems journal (01-03-2021)“…In the advanced technological world, vehicular communications are used in numerous business and safety applications for smart traffic management. With the help…”
Get full text
Journal Article -
19
An Identity-Based Authentication Protocol for the Telecare Medical Information System (TMIS) Using a Physically Unclonable Function
Published in IEEE systems journal (01-09-2022)“…Telecare Medical Information System (TMIS) encourages patients to securely exchange their health data with a remote medical server for real-time remote…”
Get full text
Journal Article -
20
An enhanced scheme for mutual authentication for healthcare services
Published in Digital communications and networks (01-04-2022)“…With the advent of state-of-art technologies, the Telecare Medicine Information System (TMIS) now offers fast and convenient healthcare services to patients at…”
Get full text
Journal Article