SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Mahmood Khalid) srt2:(2022)"

Sökning: WFRF:(Mahmood Khalid) > (2022)

  • Resultat 1-2 av 2
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Akram, Waseem, et al. (författare)
  • An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
  • 2022
  • Ingår i: Computer Networks. - : Elsevier. - 1389-1286 .- 1872-7069. ; 217
  • Tidskriftsartikel (refereegranskat)abstract
    • Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers vehicle-to-device, vehicle-to-infrastructure, and vehicle-to-vehicle communication in which the vehicles can communicate using sensing abilities. VCC is exploiting the IoT environment, cloud architecture, and vehicle resources. However, the energy-efficient privacy of communicators and security of communication are assertive problems in VCC. To accomplish this goal, we present an identity-based authentication scheme for VCC which also uses radio frequency identification (RFID). The security and robustness of the devised scheme are evaluated using informal and formal analysis. The informal analysis shows that our scheme is vigorous to resist various attacks. The formal analysis is done through Random Oracle Model (ROM) which shows that the scheme is secure and efficient. The performance of our scheme is also determined and compared with various related schemes which clearly illustrate the efficiency of the proposed scheme. Thus, our scheme is very efficient for employment in the VCC environment.
  •  
2.
  • Mahmood, Khalid, et al. (författare)
  • A seamless anonymous authentication protocol for mobile edge computing infrastructure
  • 2022
  • Ingår i: Computer Communications. - : Elsevier. - 0140-3664 .- 1873-703X. ; 186, s. 12-21
  • Tidskriftsartikel (refereegranskat)abstract
    • Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities across the scope of wireless network. In MEC environment, MEC servers along with the computing and storage capabilities are distributed at the edge of the network. However, due to the broad range of wireless communication, the fulfillment of security requirements still remain a challenging task in the for MEC environment. With the expeditious traffic expansion and growing end user requirements, the classic security protocols cannot encounter the innovative requirements of lightweightness and real-time communication. To meet these requirements, we have proposed an authentication protocol for the MEC environment. Our proposed protocol stipulates secure and efficient communication for all of the intended entities. Meanwhile, during its execution user anonymity remains intact. Moreover, our protocol is proven to be secure under the assumptions of formal security model. Additionally in this article, we have described the security properties of our protocol that it offers resistance against impersonation, session key computation and forward and backward secrecy attacks. The comparative analysis of time consumption and computation overheads are presented at the end of the paper, which is an evidence that our proposed protocol outperforms prior to various existing MEC protocols.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-2 av 2

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy