Click to open the HelpDesk interface
AECE - Front page banner

Menu:


FACTS & FIGURES

JCR Impact Factor: 0.800
JCR 5-Year IF: 1.000
SCOPUS CiteScore: 2.0
Issues per year: 4
Current issue: Feb 2024
Next issue: May 2024
Avg review time: 58 days
Avg accept to publ: 60 days
APC: 300 EUR


PUBLISHER

Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229
ROMANIA

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


TRAFFIC STATS

2,594,517 unique visits
1,030,678 downloads
Since November 1, 2009



Robots online now
Baiduspider
Googlebot


SCOPUS CiteScore

SCOPUS CiteScore


SJR SCImago RANK

SCImago Journal & Country Rank




TEXT LINKS

Anycast DNS Hosting
MOST RECENT ISSUES

 Volume 24 (2024)
 
     »   Issue 1 / 2024
 
 
 Volume 23 (2023)
 
     »   Issue 4 / 2023
 
     »   Issue 3 / 2023
 
     »   Issue 2 / 2023
 
     »   Issue 1 / 2023
 
 
 Volume 22 (2022)
 
     »   Issue 4 / 2022
 
     »   Issue 3 / 2022
 
     »   Issue 2 / 2022
 
     »   Issue 1 / 2022
 
 
 Volume 21 (2021)
 
     »   Issue 4 / 2021
 
     »   Issue 3 / 2021
 
     »   Issue 2 / 2021
 
     »   Issue 1 / 2021
 
 
  View all issues  


FEATURED ARTICLE

Analysis of the Hybrid PSO-InC MPPT for Different Partial Shading Conditions, LEOPOLDINO, A. L. M., FREITAS, C. M., MONTEIRO, L. F. C.
Issue 2/2022

AbstractPlus






LATEST NEWS

2023-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2022. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.800 (0.700 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 1.000.

2023-Jun-05
SCOPUS published the CiteScore for 2022, computed by using an improved methodology, counting the citations received in 2019-2022 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering for 2022 is 2.0. For "General Computer Science" we rank #134/233 and for "Electrical and Electronic Engineering" we rank #478/738.

2022-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2021. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.825 (0.722 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.752.

2022-Jun-16
SCOPUS published the CiteScore for 2021, computed by using an improved methodology, counting the citations received in 2018-2021 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering for 2021 is 2.5, the same as for 2020 but better than all our previous results.

2021-Jun-30
Clarivate Analytics published the InCites Journal Citations Report for 2020. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.221 (1.053 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.961.

Read More »


    
 

  1/2022 - 4

A Strong Mutual Authentication Protocol for Securing Wearable Smart Textile Applications

DALKILIC, H. See more information about DALKILIC, H. on SCOPUS See more information about DALKILIC, H. on IEEExplore See more information about DALKILIC, H. on Web of Science, OZCANHAN, M. H. See more information about OZCANHAN, M. H. on SCOPUS See more information about OZCANHAN, M. H. on SCOPUS See more information about OZCANHAN, M. H. on Web of Science
 
View the paper record and citations in View the paper record and citations in Google Scholar
Click to see author's profile in See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (1,712 KB) | Citation | Downloads: 707 | Views: 1,549

Author keywords
authentication, cryptography, Internet of Things, message authentication, wearable sensors

References keywords
authentication(23), security(14), internet(14), smart(13), secure(13), scheme(10), protocol(9), computing(8), networks(7), applications(7)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2022-02-28
Volume 22, Issue 1, Year 2022, On page(s): 31 - 38
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2022.01004
Web of Science Accession Number: 000807483500001
SCOPUS ID: 85126806389

Abstract
Quick view
Full text preview
With increasing modern technology involvement in numerous consumer areas, our cities are gradually turning into smart urban areas. Wireless technologies have especially been playing a pivotal role in making cities smarter. The popular name for wireless wearable devices is the wearable Internet of Things (IoT). Wearable IoT has begun a smart textiles movement. However, wearable IoT increased wirelessly transmitted data, opening avenues for critical data capture by unauthorized listeners. The present study offers a typical wearable textile IoT device with information security. Our work proposes a novel mutual authentication protocol between IoT devices and their gateway, supported by a state-of-the-art encryption algorithm. The protocol can increase the information security of similar smart textiles. In addition to an informal security evaluation, our protocol has been tested by two formal security analysis tools. The popular Scyther and AVISPA tools verify that the data transmission between our design wearable textile and the gateway is secure. A comparison of our work with previous proposals shows the comprehensiveness of our design and its applicability to other IoT devices, as well.


References | Cited By  «-- Click to see who has cited this paper

[1] S. Li, L. D. Xu, S. Zhao, "The Internet of things: a survey," Information Systems Frontiers, vol. 17, no. 2, pp. 243-259, 2015.
[CrossRef] [SCOPUS Times Cited 1593]


[2] M. H. Ozcanhan, "A new peculiarity to intelligent doors: security through information sharing," Pamukkale University Journal of Engineering Sciences, vol. 23, no. 5, pp. 581-587, 2017.
[CrossRef] [Web of Science Times Cited 2]


[3] M. Kamal, M. Atif, H. Mujahid, T. Shanableh, A. R. Al-Ali et al., "IoT based smart city bus stops," Future Internet, vol. 11, no. 11, 2019.
[CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 13]


[4] H. A. Khattak, H. Farman, B. Jan, I. U. Din, "Toward integrating vehicular clouds with IoT for smart city services," IEEE Network, vol. 33, no. 2, pp. 65-71, 2019.
[CrossRef] [Web of Science Times Cited 67] [SCOPUS Times Cited 90]


[5] N. Mohamed, J. Al-Jaroodi, I. Jawhar, "Towards fault tolerant fog computing for IoT-based smart city applications," In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0752-0757, 2019.
[CrossRef] [SCOPUS Times Cited 44]


[6] L. Zhao, J. Wang, J. Liu, N. Kato, "Optimal edge resource allocation in IoT-based smart cities," IEEE Network, vol. 33, no. 2, pp. 30-35, 2019.
[CrossRef] [Web of Science Times Cited 92] [SCOPUS Times Cited 106]


[7] J. V. Jacobs, L. J. Hettinger, Y. H. Huang, S. Jeffries, M. F. Lesch et al., "Employee acceptance of wearable technology in the workplace," Applied Ergonomics, vol. 78, pp. 148-156, 2019.
[CrossRef] [Web of Science Times Cited 66] [SCOPUS Times Cited 91]


[8] G. Aroganam, N. Manivannan, D. Harrison, "Review on wearable technology sensors used in consumer sport applications," Sensors, vol. 19, no. 9, 2019.
[CrossRef] [Web of Science Times Cited 179] [SCOPUS Times Cited 223]


[9] Z. A. Alizai, N. F. Tareen, I. Jadoon, "Improved IoT device authentication scheme using device capability and digital signatures," In 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 1-5, 2018.
[CrossRef] [SCOPUS Times Cited 56]


[10] I. Ali, S. Sabir, Z. Ullah, "Internet of things security, device authentication and access control: a review," International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 8, pp. 456-466, 2016

[11] K. Fan, Q. Luo, K. Zhang, Y. Yang, "Cloud-based lightweight secure RFID mutual authentication protocol in IoT," Information Sciences, vol. 527, pp. 329-340, 2020.
[CrossRef] [Web of Science Times Cited 42] [SCOPUS Times Cited 56]


[12] M. Alshahrani, I. Traore, "Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain," Journal of information security and applications, vol. 45, pp. 156-175, 2019.
[CrossRef] [Web of Science Times Cited 51] [SCOPUS Times Cited 73]


[13] M. Adeli, N. Bagheri, "Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP," IACR Cryptol. ePrint Arch, 2019

[14] N. Li, D. Liu, S. Nepal, "Lightweight mutual authentication for IoT and its applications," IEEE Transactions on Sustainable Computing, vol. 2, no. 4, pp. 359-370, 2017.
[CrossRef] [Web of Science Times Cited 50] [SCOPUS Times Cited 122]


[15] M. Saadeh, A. Sleit, K. E. Sabri, W. Almobaideen, "Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities," Journal of Network and Computer Applications, vol. 121, pp. 1-19, 2018.
[CrossRef] [Web of Science Times Cited 24] [SCOPUS Times Cited 45]


[16] B. Bera, A. K. Das, W. Balzano, C. M. Medaglia, "On the design of biometric-based user authentication protocol in smart city environment," Pattern Recognition Letters, vol. 138, pp. 439-446, 2020.
[CrossRef] [Web of Science Times Cited 22] [SCOPUS Times Cited 33]


[17] D. Shah, V. Bharadi, "IoT based biometrics implementation on Raspberry Pi," Procedia Computer Science, vol. 79, pp. 328-336, 2016.
[CrossRef] [Web of Science Times Cited 36] [SCOPUS Times Cited 62]


[18] X. Sun, S. Men, C. Zhao, Z.Zhou, "A security authentication scheme in machine-to-machine home network service," Security and Communication Networks, vol. 8, no. 16, pp. 2678-2686, 2015.
[CrossRef] [Web of Science Times Cited 22] [SCOPUS Times Cited 32]


[19] O. Aydin, G. Dalkilic, C. Kosemen, "A novel grouping proof authentication protocol for lightweight devices: GPAPXR+," Turkish Journal of Electrical Engineering & Computer Sciences, vol. 28, no. 5, pp. 3036-3051, 2020.
[CrossRef] [Web of Science Times Cited 4] [SCOPUS Times Cited 7]


[20] P. P. Gaikwad, J. P. Gabhane, S. S. Golait, "3-level secure Kerberos authentication for smart home systems using IoT," In 2015 1st International Conference on Next Generation Computing Technologies (NGCT), pp. 262-268, 2015.
[CrossRef] [SCOPUS Times Cited 31]


[21] A. W. Atamli, A. Martin, "Threat based security analysis for the Internet of things," International Workshop on Secure Internet of Things, pp. 35-43, 2014.
[CrossRef] [Web of Science Times Cited 102] [SCOPUS Times Cited 143]


[22] S. N. Firdous, Z. Baig, C. Valli, A. Ibrahim, "Modelling and evaluation of malicious attacks against the IoT MQTT protocol," In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 748-755, 2017.
[CrossRef] [Web of Science Times Cited 41] [SCOPUS Times Cited 76]


[23] M. H. Ozcanhan, S. Utku, "Attacking a PUF based mutual authentication protocol designed for Internet of things," International Journal of Computer Science and Software Engineering (IJCSSE), vol. 7, no. 11, pp. 270-274, 2018

[24] U. Cabuk, G. Kanakis, F. Dalkilic, "LTE direct as a device-to-device network technology: use cases and security," Int. J. Adv. Res. Comput. Commun. Eng. (IJARCCE), vol. 5, no. 7, pp. 401-406, 2016.
[CrossRef]


[25] C. T. Chen, C. C. Lee, I. C. Lin, "Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments," Plos one, vol. 15, no. 4, 2020.
[CrossRef] [Web of Science Times Cited 24] [SCOPUS Times Cited 29]


[26] K. N. Pallavi, V. R. Kumar, "Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment," Wireless Personal Communications, pp. 1-22, 2020.
[CrossRef] [Web of Science Times Cited 15] [SCOPUS Times Cited 20]


[27] M. Nikooghadam, H. Amintoosi, "An improved secure authentication and key agreement scheme for healthcare applications," In 2020 25th International Computer Conference, Computer Society of Iran (CSICC), pp. 1-7, 2020.
[CrossRef] [SCOPUS Times Cited 10]


[28] C. C. Chang, H. D. Le, "A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks," IEEE Transactions on wireless communications, vol. 15, no. 1,pp. 357-366, 2015.
[CrossRef] [Web of Science Times Cited 268] [SCOPUS Times Cited 309]


[29] A. K. Das, S. Kumari, V. Odelu, X. Li, F. Wu et al., "Provably secure user authentication and key agreement scheme for wireless sensor networks," Security and Communication Networks, vol. 9, no. 16, pp. 3670-3687, 2016.
[CrossRef] [Web of Science Times Cited 76] [SCOPUS Times Cited 86]


[30] A. Sangwan, V. R. Singh, "A secure authentication scheme for WiMax network and verification using scyther tool," International Journal of Applied Engineering Research, vol. 12, no. 11, 3002-3008, 2017

[31] P. K. Panda, S. Chattopadhyay, "A modified PKM environment for the security enhancement of IEEE 802.16e," Computer Standards & Interfaces, vol. 61, pp. 107-120, 2019.
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 8]


[32] A. K. Das, M. Wazid, N. Kumar, M. K. Khan, K. K. R. Choo et al., "Design of secure and lightweight authentication protocol for wearable devices environment," IEEE Journal of Biomedical and Health Informatics, vol. 22, no. 4, pp. 1310-1322, 2017.
[CrossRef] [Web of Science Times Cited 120] [SCOPUS Times Cited 150]


[33] V. Bianchi, M. Bassoli, G. Lombardo, P. Fornacciari, M. Mordonini et al., "IoT wearable sensor and deep learning: An integrated approach for personalized human activity recognition in a smart home environment," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8553-8562, 2019.
[CrossRef] [Web of Science Times Cited 193] [SCOPUS Times Cited 267]


[34] H. Dalkilic, M. H. Ozcanhan, H. Ozdemir, "Wireless data transfer with the use of Internet of things (IoT) technologies in smart textiles," The Journal of The Textile Institute, Published Online: 17 June 2021,
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 3]


[35] G. A. C. Montiel, F. B. Duque, L. A. P. Salazar, "BlueLock a tool to prevent Bluetooth attacks," Vision electronica, vol. 14, no. 1, 2020.
[CrossRef]


[36] B. Mbarek, M. Ge, T. Pitner, "An efficient mutual authentication scheme for Internet of things," Internet of Things, vol. 9, 2020.
[CrossRef] [Web of Science Times Cited 29] [SCOPUS Times Cited 33]


[37] D. Fang, Y. Qian, R. Q. Hu, "A flexible and efficient authentication and secure data transmission scheme for IoT applications," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3474-3484, 2020.
[CrossRef] [Web of Science Times Cited 43] [SCOPUS Times Cited 51]


[38] K. -H. Yeh, C. Su, K. -K. R. Choo, W. Chiu, "A novel certificateless signature scheme for smart objects in the Internet-of-things," Sensors, vol. 17, no. 5, 2017.
[CrossRef] [Web of Science Times Cited 53] [SCOPUS Times Cited 65]


[39] M. Y. Al-Shorman, M. M. Al-Kofahi, O. M. Al-Kofahi, "A practical microwatt-meter for electrical energy measurement in programmable devices," Measurement and Control, vol. 51, no. 9-10, pp. 383-395, 2018.
[CrossRef] [Web of Science Times Cited 8] [SCOPUS Times Cited 13]


[40] M. H. Ozcanhan, G. Dalkilic, S. Utku, "Cryptographically supported NFC tags in medication for better inpatient safety," Journal of medical systems, vol. 38, no. 8, 2014.
[CrossRef] [Web of Science Times Cited 11] [SCOPUS Times Cited 9]


[41] T. Nandy, M. Y. I. B. Idris, R. M. Noor, M. L. M. Kiah, L. S. Lun et al., "Review on security of Internet of things authentication mechanism," IEEE Access, vol. 7, pp. 151054-151089, 2019.
[CrossRef] [Web of Science Times Cited 61] [SCOPUS Times Cited 95]


[42] H. Wong, T. Luo, "Man-in-the-middle attacks on MQTT-based IoT using BERT based adversarial message generation," In KDD'20 Workshops: the 3rd International Workshop on Artificial Intelligence of Things (AIoT), 2020

[43] N. F. Syed, Z. Baig, A. Ibrahim, C. Valli, "Denial of service attack detection through machine learning for the IoT," Journal of Information and Telecommunication, pp. 1-22, 2020.
[CrossRef] [Web of Science Times Cited 37] [SCOPUS Times Cited 74]


[44] E. Munivel, A. Kannammal, "New authentication scheme to secure against the phishing attack in the mobile cloud computing," Security and Communication Networks, 2019.
[CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 24]


[45] N. E. Madhoun, G. Pujolle, "A secure cloud-based NFC payment architecture for small traders," In 2016 3rd Smart Cloud Networks & Systems (SCNS), pp. 1-6, 2016.
[CrossRef] [SCOPUS Times Cited 7]


[46] K. Yildirim, G. Dalkilic, N. Duru, "Security analysis of Hsiang m-coupon protocol," Journal of the Faculty of Engineering and Architecture of Gazi University, vol. 34, no. 4, pp. 1705-1724, 2019.
[CrossRef] [Web of Science Times Cited 1] [SCOPUS Times Cited 2]


[47] M. Eldefrawy, I. Butun, N. Pereira, M. Gidlund, "Formal security analysis of LoRaWAN," Computer Networks, vol. 148, pp. 328-339, 2019.
[CrossRef] [Web of Science Times Cited 61] [SCOPUS Times Cited 78]




References Weight

Web of Science® Citations for all references: 1,824 TCR
SCOPUS® Citations for all references: 4,229 TCR

Web of Science® Average Citations per reference: 38 ACR
SCOPUS® Average Citations per reference: 88 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2024-05-24 08:36 in 280 seconds.




Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2024
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania


All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.




Website loading speed and performance optimization powered by: 


DNS Made Easy