scispace - formally typeset
R

Ruhul Amin

Researcher at International Institute of Information Technology

Publications -  105
Citations -  3814

Ruhul Amin is an academic researcher from International Institute of Information Technology. The author has contributed to research in topics: Authentication protocol & Authentication. The author has an hindex of 26, co-authored 93 publications receiving 2489 citations. Previous affiliations of Ruhul Amin include Indian Institute of Technology Dhanbad & Indian Institutes of Information Technology.

Papers
More filters
Journal ArticleDOI

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks

TL;DR: The proposed protocol not only resists the above mentioned security weaknesses, but also achieves complete security requirements including specially energy efficiency, user anonymity, mutual authentication and user-friendly password change phase.
Journal ArticleDOI

A robust and anonymous patient monitoring system using wireless medical sensor networks

TL;DR: An architecture for patient monitoring health-care system in WMSN is proposed and an anonymity-preserving mutual authentication protocol for mobile users is designed and it is demonstrated that the proposed protocol is efficient and robust.
Journal ArticleDOI

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

TL;DR: Security vulnerabilities of the multi-server cloud environment of the protocols proposed by Xue et al. and Chuang et al are shown and an informal cryptanalysis confirms that the protocol is protected against all possible security threats.
Journal ArticleDOI

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

TL;DR: The main intention of this paper is to design an efficient and robust smartcard-based user authentication and session key agreement protocol for wireless sensor networks that use the Internet of Things, and its security is analyzed, proving that it overcomes the weaknesses of Farash et?al.'s protocol.
Journal ArticleDOI

Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment

TL;DR: This paper has put forwarded an RFID-based authentication architecture for distributed IoT (Internet of Things) applications suitable for the future smart city environments and designed for IoT-based infrastructure in smart city environment.