On securing underwater acoustic networks: A survey

S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …

A smart-contract-based access control framework for cloud smart healthcare system

A Saini, Q Zhu, N Singh, Y Xiang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
In current healthcare systems, electronic medical records (EMRs) are always located in
different hospitals and controlled by a centralized cloud provider. However, it leads to single …

[HTML][HTML] Smart contract-based security architecture for collaborative services in municipal smart cities

S Siddiqui, S Hameed, SA Shah, AK Khan… - Journal of Systems …, 2023 - Elsevier
Abstract The Internet of Things (IoT) can provide intelligent and effective solutions to various
applications with higher accuracy that requires less or no human intervention. Smart Cities …

A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS

C Lepore, M Ceria, A Visconti, UP Rao, KA Shah… - Mathematics, 2020 - mdpi.com
Blockchain technology started as the backbone for cryptocurriencies and it has emerged as
one of the most interesting technologies of the last decade. It is a new paradigm able to …

A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography

DJ Malan, M Welsh, MD Smith - 2004 First Annual IEEE …, 2004 - ieeexplore.ieee.org
We present the first known implementation of elliptic curve cryptography over F/sub 2p/for
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …

NanoECC: Testing the limits of elliptic curve cryptography in sensor networks

P Szczechowiak, LB Oliveira, M Scott, M Collier… - … Sensor Networks: 5th …, 2008 - Springer
Abstract By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-
Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibility …

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

LB Oliveira, DF Aranha, CPL Gouvêa, M Scott… - Computer …, 2011 - Elsevier
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric
cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off …

Integration of hardware security modules and permissioned blockchain in industrial iot networks

AJ Cabrera-Gutiérrez, E Castillo… - IEEE …, 2022 - ieeexplore.ieee.org
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers
physical protection while adding a new security layer in the system architecture. When …

Anonymous communications in mobile ad hoc networks

Y Zhang, W Liu, W Lou - … IEEE 24th Annual Joint Conference of …, 2005 - ieeexplore.ieee.org
Due to the broadcast nature of radio transmissions, communications in mobile ad hoc
networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we …

Taxonomy of public key schemes based on the problem of multivariate quadratic equations

C Wolf, B Preneel - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Multivariate quadratic systems can be used to construct both secure and efficient public key
schemes. In this article, we introduce the necessary mathematical tools to deal with …