An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks

F Mezrag, S Bitam, A Mellouk - Journal of Network and Computer …, 2022 - Elsevier
Abstract Clustered Wireless Sensor Networks (CWSNs) are typically deployed in unsecured
or even hostile areas, making them vulnerable to many cyber-attacks and security threats …

Post-quantum secure authenticated key agreement protocol for wireless sensor networks

M Singh, D Mishra - Telecommunication Systems, 2023 - Springer
In today's digital world, our communication medium has become wireless. The addition of
many sensor devices in wireless connection forms a wireless sensor network (WSN). To …

A pairing-free data authentication and aggregation mechanism for intelligent healthcare system

P Verma, DS Gupta - Computer Communications, 2023 - Elsevier
Abstract The Intelligent Healthcare System (IHS), a prominent medical area underlying the
Internet of Things (IoT), might be deployed to gather and analyze health information across a …

Pairing-free identity-based digital signature algorithm for broadcast authentication based on modified ECC using battle royal optimization algorithm

V Kumar, S Ray - Wireless Personal Communications, 2022 - Springer
In wireless sensor networks (WSN), broadcast authentication is an important security service
that provides secure communication. Several mobile users are allowed by this broadcast …

Enhanced pairing‐free identity‐based broadcast authentication protocol in WSN using ElGamal ECC

V Kumar, S Ray, D Sadhukhan, J Karmakar… - Security and …, 2023 - Wiley Online Library
Authentication among the various communicating devices within wireless sensor networks
during broadcasting is most significant among the other primary security services. This …

[PDF][PDF] A comparison among fast point multiplication algorithms in elliptic curve cryptosystem

S Padhy, TN Shankar, S Dash - 2022 - academia.edu
In the Elliptic Curve Cryptosystem, the multiplication of points is essential in the successful
computation of any operation. Reduction of time complexity for the mathematical operations …

A lightweight, efficient, and secure identity-based authentication scheme for underwater green transport systems

R Yaduvanshi, S Mishra, N Yadav… - Annals of …, 2024 - Springer
The underwater green transport system (UwGTs) is a network of connected, intelligent
underwater sensors or Internet of Things (IoT) devices. The sensor networks used in UwGTs …

面向工业物联网的无配对数据高效验证和聚合协议

马蓉, 冯涛 - 通信学报, 2024 - infocomm-journal.com
作为智能制造的支撑技术, 工业物联网利用高效的数据共享驱动着工业生产的网络化, 数字化,
智能化, 有助于制造企业降本增效, 提升自身核心竞争力. 然而因为工业生产现场设备自身资源的 …

Cryptanalysis in e-commerce: A novel arrangement procedure using DHEC-SAT upon elliptic curve cryptography

Fauziyah, Z Wang - Multimedia Tools and Applications, 2024 - Springer
Cryptanalytic innovations are considered the most economical and useful method for
guaranteeing information security across shared networks. Despite the tinier key magnitude …

[PDF][PDF] New Key Agreement Protocol and Cryptosystem over ECC under SET Protocol Environment in E-Commerce

NM Lingamgunta, S Gubbala - International Journal of Intelligent …, 2022 - inass.org
Cryptographic technologies are the most cost-effective and practical way to secure data
transfer over an open public network. Although ECC (Elliptic Curve Cryptography) has a …