• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Ai, X. (Ai, X..) | Badshah, A. (Badshah, A..) | Tu, S. (Tu, S..) | Waqas, M. (Waqas, M..) | Ahmad, I. (Ahmad, I..)

Indexed by:

EI Scopus SCIE

Abstract:

For wearable devices with constrained computational resources, it is typically required to offload processing tasks to more capable servers. However, this practice introduces vulnerabilities to data confidentiality and integrity due to potential malicious network attacks, unreliable servers, and insecure communication channels. A robust mechanism that ensures anonymous authentication and key agreement is therefore imperative for safeguarding the authenticity of computing entities and securing data during transmission. Recently, Guo et al. proposed an anonymous authentication key agreement and group proof protocol specifically designed for wearable devices. This protocol, benefiting from the strengths of previous research, is designed to thwart a variety of cyber threats. However, inaccuracies in their protocol lead to issues with authenticity verification, ultimately preventing the establishment of secure session keys between communication entities. To address these design flaws, an improved ultra-lightweight protocol was proposed, employing cryptographic hash functions to ensure authentication and privacy during data transmission in wearable devices. Supported by rigorous security validations and analyses, the proposed protocol significantly boosts both security and efficiency, marking a substantial advancement over prior methodologies.  © 2002-2012 IEEE.

Keyword:

key agreement hash functions privacy Wearable devices anonymous authentication security

Author Community:

  • [ 1 ] [Ai X.]Beijing University of Technology, College of Computer Science, Beijing, 100124, China
  • [ 2 ] [Badshah A.]University of Malakand, Department of Software Engineering, Dir Lower, Pakistan
  • [ 3 ] [Tu S.]Beijing University of Technology, College of Computer Science, Beijing, 100124, China
  • [ 4 ] [Waqas M.]University of Greenwich, Centre for Sustainable Cyber Security, School of Computing and Mathematical Sciences, Faculty of Engineering and Science, United Kingdom
  • [ 5 ] [Waqas M.]Edith Cowan University, School of Engineering, Perth, 6007, WA, Australia
  • [ 6 ] [Ahmad I.]Edith Cowan University, School of Engineering, Perth, 6007, WA, Australia

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Source :

IEEE Transactions on Mobile Computing

ISSN: 1536-1233

Year: 2025

7 . 9 0 0

JCR@2022

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 24

Affiliated Colleges:

Online/Total:1262/10719802
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.