[HTML][HTML] Lightweight public key infrastructure for the Internet of Things: A systematic literature review

M El-Hajj, P Beune - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract The Internet of Things (IoT) has transformed everyday environments into
interconnected cyber–physical systems, enabling automation and assistance for diverse …

Secure communication in UAV assisted HetNets: a proposed model

A Rashid, D Sharma, TA Lone, S Gupta… - Security, Privacy, and …, 2019 - Springer
In the current scientific and technological world, every emerging/advanced country employs
Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its …

Serial communication protocol with enhanced properties–securing communication layer for smart sensors applications

J Dudak, G Gaspar, S Sedivy, P Fabo… - IEEE Sensors …, 2018 - ieeexplore.ieee.org
The essential component of all the control and sensory systems is a communication layer.
The MODBUS protocol used in automation and sensory industry defines a simple format of …

Applications of identity-based cryptography in smart home and healthcare: A recent review

S Garg, S Nayak, AB Bavani Sankar, S Maity - Cyber Security in Intelligent …, 2022 - Springer
Advancement in technology has led to an exponential growth of Internet of Things (IoT)
devices. IoT devices make our lives easier by providing all the advantages in relation to …

The case for federated identity management in 5G communications

EKK Edris, M Aiash, JKK Loo - 2020 Fifth International …, 2020 - ieeexplore.ieee.org
The heterogeneous nature of fifth generation mobile network (5G) makes the access and
provision of network services very difficult and raises security concerns. With multi-users and …

Identity-based encryption in uav assisted hetnets: A survey

A Rashid, D Sharma, TA Lone, S Gupta… - 2019 10th …, 2019 - ieeexplore.ieee.org
In this modern technological world, the Unmanned Ariel Vehicle (UAV) assisted
Heterogeneous Networks (HetNets) is almost being used by every developing/developed …

Making the Identity-Based Diffie–Hellman Key Exchange Efficiently Revocable

K Nakagawa, A Fujioka, A Nagai, J Tomida… - … on Cryptology and …, 2023 - Springer
We propose an efficient identity-based authenticated-key exchange (IB-AKE) protocol that is
equipped with scalable key revocation. Our protocol builds upon the most efficient identity …

Implementation of a strongly robust identity-based encryption scheme over type-3 pairings

H Okano, K Emura, T Ishibashi, T Ohigashi… - International Journal of …, 2020 - jstage.jst.go.jp
1.1 Background Public-key encryption (PKE) is an important mechanism for maintaining
security in several organizations. Identity-based encryption (IBE)[52] is an extension of PKE …

Securing Topology Control in SDWSNs Using Identity‐Based Cryptography

R Wang, D Liu, X Liu, J Chen, L Ma, Y Wang… - Journal of …, 2023 - Wiley Online Library
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental
procedure to maintain the global network topology. However, the open wireless channels of …

Towards indeterminacy-tolerant access control in iot

M Heydari, A Mylonas, V Katos, D Gritzalis - Handbook of Big Data and IoT …, 2019 - Springer
The ultimate goal of any access control system is to assign precisely the necessary level of
access (ie, no more and no less) to each subject. Meeting this goal is challenging in an …