Page 73 - IJEEE-2023-Vol19-ISSUE-1
P. 73
Fareed & Yassin | 69
GLOBECOM 2017-2017 IEEE Global Communications
Conference, 2017: IEEE, pp. 1-6.
[16] Z. Xu, C. Xu, H. Chen, and F. Yang, "A lightweight
anonymous mutual authentication and key agreement
scheme for WBAN," Concurrency and computation:
Practice and experience, vol. 31, no. 14, p. e5295, 2019.
[17] B. A. Alzahrani, A. Irshad, A. Albeshri, and K. Alsubhi,
"A provably secure and lightweight patient-healthcare
authentication protocol in wireless body area networks,"
Wireless Personal Communications, vol. 117, no. 1, pp.
47-69, 2021.
[18] D. He, S. Zeadally, B. Xu, and X. Huang, "An efficient
identity-based conditional privacy-preserving
authentication scheme for vehicular ad hoc networks,"
IEEE Transactions on Information Forensics and
Security, vol. 10, no. 12, pp. 2681-2691, 2015.
[19] C.-C. Chang and H.-C. Tsai, "An anonymous and self-
verified mobile authentication with authenticated key
agreement for large-scale wireless networks," IEEE
Transactions on Wireless Communications, vol. 9, no. 11,
pp. 3346-3353, 2010.
[20] H. I. Nasser and M. A. Hussain, "Provably curb man-
in-the-middle attack-based ARP spoofing in a local
network," Bulletin of Electrical Engineering and
Informatics, vol. 11, no. 4, 2022.
[21] Mustafa H. Alzuwaini, and Ali A. Yassin, " An
Efficient Mechanism to Prevent the Phishing Attacks "
Iraqi Journal for Electrical & Electronic Engineering, vol.
17, Issue 1, pp. 125-135, 2021.