An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks
Abstract Clustered Wireless Sensor Networks (CWSNs) are typically deployed in unsecured
or even hostile areas, making them vulnerable to many cyber-attacks and security threats …
or even hostile areas, making them vulnerable to many cyber-attacks and security threats …
Post-quantum secure authenticated key agreement protocol for wireless sensor networks
M Singh, D Mishra - Telecommunication Systems, 2023 - Springer
In today's digital world, our communication medium has become wireless. The addition of
many sensor devices in wireless connection forms a wireless sensor network (WSN). To …
many sensor devices in wireless connection forms a wireless sensor network (WSN). To …
A pairing-free data authentication and aggregation mechanism for intelligent healthcare system
Abstract The Intelligent Healthcare System (IHS), a prominent medical area underlying the
Internet of Things (IoT), might be deployed to gather and analyze health information across a …
Internet of Things (IoT), might be deployed to gather and analyze health information across a …
Pairing-free identity-based digital signature algorithm for broadcast authentication based on modified ECC using battle royal optimization algorithm
In wireless sensor networks (WSN), broadcast authentication is an important security service
that provides secure communication. Several mobile users are allowed by this broadcast …
that provides secure communication. Several mobile users are allowed by this broadcast …
Enhanced pairing‐free identity‐based broadcast authentication protocol in WSN using ElGamal ECC
Authentication among the various communicating devices within wireless sensor networks
during broadcasting is most significant among the other primary security services. This …
during broadcasting is most significant among the other primary security services. This …
[PDF][PDF] A comparison among fast point multiplication algorithms in elliptic curve cryptosystem
In the Elliptic Curve Cryptosystem, the multiplication of points is essential in the successful
computation of any operation. Reduction of time complexity for the mathematical operations …
computation of any operation. Reduction of time complexity for the mathematical operations …
A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems
R Yaduvanshi, S Mishra, N Yadav… - Annals of …, 2024 - Springer
The underwater green transport system (UwGTs) is a network of connected, intelligent
underwater sensors or Internet of Things (IoT) devices. The sensor networks used in UwGTs …
underwater sensors or Internet of Things (IoT) devices. The sensor networks used in UwGTs …
面向工业物联网的无配对数据高效验证和聚合协议
马蓉, 冯涛 - 通信学报, 2024 - infocomm-journal.com
作为智能制造的支撑技术, 工业物联网利用高效的数据共享驱动着工业生产的网络化, 数字化,
智能化, 有助于制造企业降本增效, 提升自身核心竞争力. 然而因为工业生产现场设备自身资源的 …
智能化, 有助于制造企业降本增效, 提升自身核心竞争力. 然而因为工业生产现场设备自身资源的 …
Cryptanalysis in e-commerce: A novel arrangement procedure using DHEC-SAT upon elliptic curve cryptography
Fauziyah, Z Wang - Multimedia Tools and Applications, 2024 - Springer
Cryptanalytic innovations are considered the most economical and useful method for
guaranteeing information security across shared networks. Despite the tinier key magnitude …
guaranteeing information security across shared networks. Despite the tinier key magnitude …
[PDF][PDF] New Key Agreement Protocol and Cryptosystem over ECC under SET Protocol Environment in E-Commerce
NM Lingamgunta, S Gubbala - International Journal of Intelligent …, 2022 - inass.org
Cryptographic technologies are the most cost-effective and practical way to secure data
transfer over an open public network. Although ECC (Elliptic Curve Cryptography) has a …
transfer over an open public network. Although ECC (Elliptic Curve Cryptography) has a …