[HTML][HTML] Lightweight public key infrastructure for the Internet of Things: A systematic literature review
M El-Hajj, P Beune - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract The Internet of Things (IoT) has transformed everyday environments into
interconnected cyber–physical systems, enabling automation and assistance for diverse …
interconnected cyber–physical systems, enabling automation and assistance for diverse …
Secure communication in UAV assisted HetNets: a proposed model
A Rashid, D Sharma, TA Lone, S Gupta… - Security, Privacy, and …, 2019 - Springer
In the current scientific and technological world, every emerging/advanced country employs
Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its …
Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its …
Serial communication protocol with enhanced properties–securing communication layer for smart sensors applications
The essential component of all the control and sensory systems is a communication layer.
The MODBUS protocol used in automation and sensory industry defines a simple format of …
The MODBUS protocol used in automation and sensory industry defines a simple format of …
Applications of identity-based cryptography in smart home and healthcare: A recent review
S Garg, S Nayak, AB Bavani Sankar, S Maity - Cyber Security in Intelligent …, 2022 - Springer
Advancement in technology has led to an exponential growth of Internet of Things (IoT)
devices. IoT devices make our lives easier by providing all the advantages in relation to …
devices. IoT devices make our lives easier by providing all the advantages in relation to …
The case for federated identity management in 5G communications
The heterogeneous nature of fifth generation mobile network (5G) makes the access and
provision of network services very difficult and raises security concerns. With multi-users and …
provision of network services very difficult and raises security concerns. With multi-users and …
Identity-based encryption in uav assisted hetnets: A survey
In this modern technological world, the Unmanned Ariel Vehicle (UAV) assisted
Heterogeneous Networks (HetNets) is almost being used by every developing/developed …
Heterogeneous Networks (HetNets) is almost being used by every developing/developed …
Making the Identity-Based Diffie–Hellman Key Exchange Efficiently Revocable
K Nakagawa, A Fujioka, A Nagai, J Tomida… - … on Cryptology and …, 2023 - Springer
We propose an efficient identity-based authenticated-key exchange (IB-AKE) protocol that is
equipped with scalable key revocation. Our protocol builds upon the most efficient identity …
equipped with scalable key revocation. Our protocol builds upon the most efficient identity …
Implementation of a strongly robust identity-based encryption scheme over type-3 pairings
H Okano, K Emura, T Ishibashi, T Ohigashi… - International Journal of …, 2020 - jstage.jst.go.jp
1.1 Background Public-key encryption (PKE) is an important mechanism for maintaining
security in several organizations. Identity-based encryption (IBE)[52] is an extension of PKE …
security in several organizations. Identity-based encryption (IBE)[52] is an extension of PKE …
Securing Topology Control in SDWSNs Using Identity‐Based Cryptography
R Wang, D Liu, X Liu, J Chen, L Ma, Y Wang… - Journal of …, 2023 - Wiley Online Library
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental
procedure to maintain the global network topology. However, the open wireless channels of …
procedure to maintain the global network topology. However, the open wireless channels of …
Towards indeterminacy-tolerant access control in iot
The ultimate goal of any access control system is to assign precisely the necessary level of
access (ie, no more and no less) to each subject. Meeting this goal is challenging in an …
access (ie, no more and no less) to each subject. Meeting this goal is challenging in an …