571 research outputs found

    Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments

    Get PDF
    In the smart environments several smart devices are continuously working together to make individuals' lives more comfortable. Few of the examples are smart homes, smart buildings, smart airports, etc. These environments consist of many resource constrained heterogeneous entities which are interconnected, controlled, monitored and analyzed through the Internet. One of the most challenging tasks in a distributed smart environment is how to provide robust security to the resource constraint Internet-enabled devices. However, an authentication can play a major role ensuring that only authorized devices are being connected to the distributed smart environment applications. In this paper, we present a robust and lightweight mutual-authentication scheme (RLMA) for protecting distributed smart environments from unauthorized abuses. The proposed scheme uses implicit certificates and enables mutual authentication and key agreement between the smart devices in a smart environment. The RLMA not only resists to various attacks but it also achieves efficiency by reducing the computation and communication complexities. Moreover, both security analysis and performance evaluation prove the effectiveness of RLMA as compared to the state of the art schemes

    A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care

    Get PDF

    Towards 6G: Key technological directions

    Get PDF
    Sixth-generation mobile networks (6G) are expected to reach extreme communication capabilities to realize emerging applications demanded by the future society. This paper focuses on six technological directions towards 6G, namely, intent-based networking, THz communication, artificial intelligence, distributed ledger technology/blockchain, smart devices and gadget-free communication, and quantum communication. These technologies will enable 6G to be more capable of catering to the demands of future network services and applications. Each of these technologies is discussed highlighting recent developments, applicability in 6G, and deployment challenges. It is envisaged that this work will facilitate 6G related research and developments, especially along the six technological directions discussed in the paper
    • …
    corecore