Click to open the HelpDesk interface
AECE - Front page banner

Menu:


FACTS & FIGURES

JCR Impact Factor: 0.825
JCR 5-Year IF: 0.752
SCOPUS CiteScore: 2.5
Issues per year: 4
Current issue: May 2022
Next issue: Aug 2022
Avg review time: 78 days
Avg accept to publ: 48 days
APC: 300 EUR


PUBLISHER

Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229
ROMANIA

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


TRAFFIC STATS

1,921,569 unique visits
743,456 downloads
Since November 1, 2009



Robots online now
Googlebot
PetalBot
SemanticScholar


SCOPUS CiteScore

SCOPUS CiteScore


SJR SCImago RANK

SCImago Journal & Country Rank




TEXT LINKS

Anycast DNS Hosting
MOST RECENT ISSUES

 Volume 22 (2022)
 
     »   Issue 2 / 2022
 
     »   Issue 1 / 2022
 
 
 Volume 21 (2021)
 
     »   Issue 4 / 2021
 
     »   Issue 3 / 2021
 
     »   Issue 2 / 2021
 
     »   Issue 1 / 2021
 
 
 Volume 20 (2020)
 
     »   Issue 4 / 2020
 
     »   Issue 3 / 2020
 
     »   Issue 2 / 2020
 
     »   Issue 1 / 2020
 
 
 Volume 19 (2019)
 
     »   Issue 4 / 2019
 
     »   Issue 3 / 2019
 
     »   Issue 2 / 2019
 
     »   Issue 1 / 2019
 
 
 Volume 18 (2018)
 
     »   Issue 4 / 2018
 
     »   Issue 3 / 2018
 
     »   Issue 2 / 2018
 
     »   Issue 1 / 2018
 
 
  View all issues  








LATEST NEWS

2022-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2021. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.825 (0.722 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.752.

2022-Jun-16
SCOPUS published the CiteScore for 2021, computed by using an improved methodology, counting the citations received in 2018-2021 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering in 2021 is 2.5, the same as for 2020 but better than all our previous results.

2021-Jun-30
Clarivate Analytics published the InCites Journal Citations Report for 2020. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.221 (1.053 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.961.

2021-Jun-06
SCOPUS published the CiteScore for 2020, computed by using an improved methodology, counting the citations received in 2017-2020 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering in 2020 is 2.5, better than all our previous results.

2021-Apr-15
Release of the v3 version of AECE Journal website. We moved to a new server and implemented the latest cryptographic protocols to assure better compatibility with the most recent browsers. Our website accepts now only TLS 1.2 and TLS 1.3 secure connections.

Read More »


    
 

  1/2022 - 4

A Strong Mutual Authentication Protocol for Securing Wearable Smart Textile Applications

DALKILIC, H. See more information about DALKILIC, H. on SCOPUS See more information about DALKILIC, H. on IEEExplore See more information about DALKILIC, H. on Web of Science, OZCANHAN, M. H. See more information about OZCANHAN, M. H. on SCOPUS See more information about OZCANHAN, M. H. on SCOPUS See more information about OZCANHAN, M. H. on Web of Science
 
View the paper record and citations in View the paper record and citations in Google Scholar
Click to see author's profile in See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (1,712 KB) | Citation | Downloads: 340 | Views: 273

Author keywords
authentication, cryptography, Internet of Things, message authentication, wearable sensors

References keywords
authentication(23), security(14), internet(14), smart(13), secure(13), scheme(10), protocol(9), computing(8), networks(7), applications(7)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2022-02-28
Volume 22, Issue 1, Year 2022, On page(s): 31 - 38
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2022.01004
Web of Science Accession Number: 000807483500001
SCOPUS ID: 85126806389

Abstract
Quick view
Full text preview
With increasing modern technology involvement in numerous consumer areas, our cities are gradually turning into smart urban areas. Wireless technologies have especially been playing a pivotal role in making cities smarter. The popular name for wireless wearable devices is the wearable Internet of Things (IoT). Wearable IoT has begun a smart textiles movement. However, wearable IoT increased wirelessly transmitted data, opening avenues for critical data capture by unauthorized listeners. The present study offers a typical wearable textile IoT device with information security. Our work proposes a novel mutual authentication protocol between IoT devices and their gateway, supported by a state-of-the-art encryption algorithm. The protocol can increase the information security of similar smart textiles. In addition to an informal security evaluation, our protocol has been tested by two formal security analysis tools. The popular Scyther and AVISPA tools verify that the data transmission between our design wearable textile and the gateway is secure. A comparison of our work with previous proposals shows the comprehensiveness of our design and its applicability to other IoT devices, as well.


References | Cited By  «-- Click to see who has cited this paper

[1] S. Li, L. D. Xu, S. Zhao, "The Internet of things: a survey," Information Systems Frontiers, vol. 17, no. 2, pp. 243-259, 2015.
[CrossRef] [SCOPUS Times Cited 1082]


[2] M. H. Ozcanhan, "A new peculiarity to intelligent doors: security through information sharing," Pamukkale University Journal of Engineering Sciences, vol. 23, no. 5, pp. 581-587, 2017.
[CrossRef] [Web of Science Times Cited 1]


[3] M. Kamal, M. Atif, H. Mujahid, T. Shanableh, A. R. Al-Ali et al., "IoT based smart city bus stops," Future Internet, vol. 11, no. 11, 2019.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 7]


[4] H. A. Khattak, H. Farman, B. Jan, I. U. Din, "Toward integrating vehicular clouds with IoT for smart city services," IEEE Network, vol. 33, no. 2, pp. 65-71, 2019.
[CrossRef] [Web of Science Times Cited 50] [SCOPUS Times Cited 59]


[5] N. Mohamed, J. Al-Jaroodi, I. Jawhar, "Towards fault tolerant fog computing for IoT-based smart city applications," In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0752-0757, 2019.
[CrossRef] [SCOPUS Times Cited 25]


[6] L. Zhao, J. Wang, J. Liu, N. Kato, "Optimal edge resource allocation in IoT-based smart cities," IEEE Network, vol. 33, no. 2, pp. 30-35, 2019.
[CrossRef] [Web of Science Times Cited 64] [SCOPUS Times Cited 68]


[7] J. V. Jacobs, L. J. Hettinger, Y. H. Huang, S. Jeffries, M. F. Lesch et al., "Employee acceptance of wearable technology in the workplace," Applied Ergonomics, vol. 78, pp. 148-156, 2019.
[CrossRef] [Web of Science Times Cited 39] [SCOPUS Times Cited 50]


[8] G. Aroganam, N. Manivannan, D. Harrison, "Review on wearable technology sensors used in consumer sport applications," Sensors, vol. 19, no. 9, 2019.
[CrossRef] [Web of Science Times Cited 96] [SCOPUS Times Cited 113]


[9] Z. A. Alizai, N. F. Tareen, I. Jadoon, "Improved IoT device authentication scheme using device capability and digital signatures," In 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pp. 1-5, 2018.
[CrossRef] [SCOPUS Times Cited 34]


[10] I. Ali, S. Sabir, Z. Ullah, "Internet of things security, device authentication and access control: a review," International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 8, pp. 456-466, 2016

[11] K. Fan, Q. Luo, K. Zhang, Y. Yang, "Cloud-based lightweight secure RFID mutual authentication protocol in IoT," Information Sciences, vol. 527, pp. 329-340, 2020.
[CrossRef] [Web of Science Times Cited 15] [SCOPUS Times Cited 21]


[12] M. Alshahrani, I. Traore, "Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain," Journal of information security and applications, vol. 45, pp. 156-175, 2019.
[CrossRef] [Web of Science Times Cited 29] [SCOPUS Times Cited 40]


[13] M. Adeli, N. Bagheri, "Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP," IACR Cryptol. ePrint Arch, 2019

[14] N. Li, D. Liu, S. Nepal, "Lightweight mutual authentication for IoT and its applications," IEEE Transactions on Sustainable Computing, vol. 2, no. 4, pp. 359-370, 2017.
[CrossRef] [Web of Science Times Cited 28] [SCOPUS Times Cited 84]


[15] M. Saadeh, A. Sleit, K. E. Sabri, W. Almobaideen, "Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities," Journal of Network and Computer Applications, vol. 121, pp. 1-19, 2018.
[CrossRef] [Web of Science Times Cited 19] [SCOPUS Times Cited 34]


[16] B. Bera, A. K. Das, W. Balzano, C. M. Medaglia, "On the design of biometric-based user authentication protocol in smart city environment," Pattern Recognition Letters, vol. 138, pp. 439-446, 2020.
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 9]


[17] D. Shah, V. Bharadi, "IoT based biometrics implementation on Raspberry Pi," Procedia Computer Science, vol. 79, pp. 328-336, 2016.
[CrossRef] [Web of Science Times Cited 36] [SCOPUS Times Cited 56]


[18] X. Sun, S. Men, C. Zhao, Z.Zhou, "A security authentication scheme in machine-to-machine home network service," Security and Communication Networks, vol. 8, no. 16, pp. 2678-2686, 2015.
[CrossRef] [Web of Science Times Cited 20] [SCOPUS Times Cited 26]


[19] O. Aydin, G. Dalkilic, C. Kosemen, "A novel grouping proof authentication protocol for lightweight devices: GPAPXR+," Turkish Journal of Electrical Engineering & Computer Sciences, vol. 28, no. 5, pp. 3036-3051, 2020.
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 5]


[20] P. P. Gaikwad, J. P. Gabhane, S. S. Golait, "3-level secure Kerberos authentication for smart home systems using IoT," In 2015 1st International Conference on Next Generation Computing Technologies (NGCT), pp. 262-268, 2015.
[CrossRef] [SCOPUS Times Cited 24]


[21] A. W. Atamli, A. Martin, "Threat based security analysis for the Internet of things," International Workshop on Secure Internet of Things, pp. 35-43, 2014.
[CrossRef] [Web of Science Times Cited 79] [SCOPUS Times Cited 112]


[22] S. N. Firdous, Z. Baig, C. Valli, A. Ibrahim, "Modelling and evaluation of malicious attacks against the IoT MQTT protocol," In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 748-755, 2017.
[CrossRef] [Web of Science Times Cited 29] [SCOPUS Times Cited 51]


[23] M. H. Ozcanhan, S. Utku, "Attacking a PUF based mutual authentication protocol designed for Internet of things," International Journal of Computer Science and Software Engineering (IJCSSE), vol. 7, no. 11, pp. 270-274, 2018

[24] U. Cabuk, G. Kanakis, F. Dalkilic, "LTE direct as a device-to-device network technology: use cases and security," Int. J. Adv. Res. Comput. Commun. Eng. (IJARCCE), vol. 5, no. 7, pp. 401-406, 2016.
[CrossRef]


[25] C. T. Chen, C. C. Lee, I. C. Lin, "Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments," Plos one, vol. 15, no. 4, 2020.
[CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 9]


[26] K. N. Pallavi, V. R. Kumar, "Authentication-based access control and data exchanging mechanism of IoT devices in fog computing environment," Wireless Personal Communications, pp. 1-22, 2020.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 7]


[27] M. Nikooghadam, H. Amintoosi, "An improved secure authentication and key agreement scheme for healthcare applications," In 2020 25th International Computer Conference, Computer Society of Iran (CSICC), pp. 1-7, 2020.
[CrossRef] [SCOPUS Times Cited 4]


[28] C. C. Chang, H. D. Le, "A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks," IEEE Transactions on wireless communications, vol. 15, no. 1,pp. 357-366, 2015.
[CrossRef] [Web of Science Times Cited 196] [SCOPUS Times Cited 216]


[29] A. K. Das, S. Kumari, V. Odelu, X. Li, F. Wu et al., "Provably secure user authentication and key agreement scheme for wireless sensor networks," Security and Communication Networks, vol. 9, no. 16, pp. 3670-3687, 2016.
[CrossRef] [Web of Science Times Cited 58] [SCOPUS Times Cited 64]


[30] A. Sangwan, V. R. Singh, "A secure authentication scheme for WiMax network and verification using scyther tool," International Journal of Applied Engineering Research, vol. 12, no. 11, 3002-3008, 2017

[31] P. K. Panda, S. Chattopadhyay, "A modified PKM environment for the security enhancement of IEEE 802.16e," Computer Standards & Interfaces, vol. 61, pp. 107-120, 2019.
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 6]


[32] A. K. Das, M. Wazid, N. Kumar, M. K. Khan, K. K. R. Choo et al., "Design of secure and lightweight authentication protocol for wearable devices environment," IEEE Journal of Biomedical and Health Informatics, vol. 22, no. 4, pp. 1310-1322, 2017.
[CrossRef] [Web of Science Times Cited 90] [SCOPUS Times Cited 103]


[33] V. Bianchi, M. Bassoli, G. Lombardo, P. Fornacciari, M. Mordonini et al., "IoT wearable sensor and deep learning: An integrated approach for personalized human activity recognition in a smart home environment," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8553-8562, 2019.
[CrossRef] [Web of Science Times Cited 93] [SCOPUS Times Cited 116]


[34] H. Dalkilic, M. H. Ozcanhan, H. Ozdemir, "Wireless data transfer with the use of Internet of things (IoT) technologies in smart textiles," The Journal of The Textile Institute, Published Online: 17 June 2021,
[CrossRef] [Web of Science Times Cited 1] [SCOPUS Times Cited 1]


[35] G. A. C. Montiel, F. B. Duque, L. A. P. Salazar, "BlueLock a tool to prevent Bluetooth attacks," Vision electronica, vol. 14, no. 1, 2020.
[CrossRef]


[36] B. Mbarek, M. Ge, T. Pitner, "An efficient mutual authentication scheme for Internet of things," Internet of Things, vol. 9, 2020.
[CrossRef] [Web of Science Times Cited 18] [SCOPUS Times Cited 21]


[37] D. Fang, Y. Qian, R. Q. Hu, "A flexible and efficient authentication and secure data transmission scheme for IoT applications," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3474-3484, 2020.
[CrossRef] [Web of Science Times Cited 25] [SCOPUS Times Cited 25]


[38] K. -H. Yeh, C. Su, K. -K. R. Choo, W. Chiu, "A novel certificateless signature scheme for smart objects in the Internet-of-things," Sensors, vol. 17, no. 5, 2017.
[CrossRef] [Web of Science Times Cited 38] [SCOPUS Times Cited 46]


[39] M. Y. Al-Shorman, M. M. Al-Kofahi, O. M. Al-Kofahi, "A practical microwatt-meter for electrical energy measurement in programmable devices," Measurement and Control, vol. 51, no. 9-10, pp. 383-395, 2018.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 5]


[40] M. H. Ozcanhan, G. Dalkilic, S. Utku, "Cryptographically supported NFC tags in medication for better inpatient safety," Journal of medical systems, vol. 38, no. 8, 2014.
[CrossRef] [Web of Science Times Cited 10] [SCOPUS Times Cited 8]


[41] T. Nandy, M. Y. I. B. Idris, R. M. Noor, M. L. M. Kiah, L. S. Lun et al., "Review on security of Internet of things authentication mechanism," IEEE Access, vol. 7, pp. 151054-151089, 2019.
[CrossRef] [Web of Science Times Cited 31] [SCOPUS Times Cited 42]


[42] H. Wong, T. Luo, "Man-in-the-middle attacks on MQTT-based IoT using BERT based adversarial message generation," In KDD'20 Workshops: the 3rd International Workshop on Artificial Intelligence of Things (AIoT), 2020

[43] N. F. Syed, Z. Baig, A. Ibrahim, C. Valli, "Denial of service attack detection through machine learning for the IoT," Journal of Information and Telecommunication, pp. 1-22, 2020.
[CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 20]


[44] E. Munivel, A. Kannammal, "New authentication scheme to secure against the phishing attack in the mobile cloud computing," Security and Communication Networks, 2019.
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 15]


[45] N. E. Madhoun, G. Pujolle, "A secure cloud-based NFC payment architecture for small traders," In 2016 3rd Smart Cloud Networks & Systems (SCNS), pp. 1-6, 2016.
[CrossRef] [SCOPUS Times Cited 5]


[46] K. Yildirim, G. Dalkilic, N. Duru, "Security analysis of Hsiang m-coupon protocol," Journal of the Faculty of Engineering and Architecture of Gazi University, vol. 34, no. 4, pp. 1705-1724, 2019.
[CrossRef] [Web of Science Times Cited 1] [SCOPUS Times Cited 2]


[47] M. Eldefrawy, I. Butun, N. Pereira, M. Gidlund, "Formal security analysis of LoRaWAN," Computer Networks, vol. 148, pp. 328-339, 2019.
[CrossRef] [Web of Science Times Cited 39] [SCOPUS Times Cited 47]




References Weight

Web of Science® Citations for all references: 1,156 TCR
SCOPUS® Citations for all references: 2,662 TCR

Web of Science® Average Citations per reference: 24 ACR
SCOPUS® Average Citations per reference: 55 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2022-07-01 09:49 in 246 seconds.




Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2022
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania


All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.




Website loading speed and performance optimization powered by: