Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks
AbstractAt present, the rapid development of satellite capabilities has prompted the proposal of satellite–terrestrial integrated networks (STIN), which solves the problem of limited signal coverage of terrestrial cellular networks, further promotes the ...
Highlights- An access authentication protocol supporting batch verification for STIN is proposed.
- The batch verification mechanism reduces the verification overhead of satellites.
- The handover authentication mechanism is lightweight and ...
- research-articleOctober 2024
Lightweight Authentication Scheme Based on ECC for IoT
AbstractThe presence of the Internet of Things (IoT) enables the exponential growth of IoT devices. The IoT commonly involves many limited resources that are incapable of processing classical cryptographic protocols and vulnerable to threats like privacy ...
- research-articleNovember 2024
Blockchain-based anonymous authentication and data aggregation for advanced metering infrastructure in smart grid
International Journal of Critical Infrastructure Protection (IJCIP), Volume 46, Issue Chttps://doi.org/10.1016/j.ijcip.2024.100702AbstractThis paper proposes a blockchain-based scheme, focusing on anonymous identity authentication and data aggregation, for safer and more reliable bidirectional communication between the utility company and power consumers based on Advanced Metering ...
- research-articleNovember 2024
A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
Computers and Electrical Engineering (CENG), Volume 118, Issue PAhttps://doi.org/10.1016/j.compeleceng.2024.109330AbstractCyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity protocols on IoT devices, platform packages, and Internet tools. A significant problem is developing a simple security mechanism suitable for resource-...
- research-articleJuly 2024
A dual hashing-based authentication and secure data transmission scheme for vehicular cloud environment using MECC with optimal resource allocation mechanism
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 28, Issue 17-18Pages 10423–10437https://doi.org/10.1007/s00500-024-09808-7AbstractVehicle cloud computing (VCC) is a recent area of study that blends vehicular networks with cloud computing, offering networking and sensor capabilities to vehicles for interaction with other vehicles and roadside infrastructure. Integrating ...
-
- ArticleJuly 2024
A Novel Window NAF on Koblitz Curves
- research-articleJuly 2024
X2065: Lightweight Key Exchange for the Internet of Things
CPSS '24: Proceedings of the 10th ACM Cyber-Physical System Security WorkshopPages 43–52https://doi.org/10.1145/3626205.3659153The Internet is rapidly transitioning from a network of personal computers, laptops and mobile phones to a network that will soon connect 32 billion smart devices (or "things"), many of which are extremely constrained in terms of computational resources ...
- research-articleAugust 2024
Optimized Implementation of SM2 Algorithm Based on Mobile Platforms
HP3C '24: Proceedings of the 2024 8th International Conference on High Performance Compilation, Computing and CommunicationsPages 12–19https://doi.org/10.1145/3675018.3675776SM2 algorithm is a commercial cryptographic algorithm based on elliptic curve cryptography proposed by China in 2010. In this paper, we propose the following schemes for its optimization on ARMv8-A architecture: when SM2 algorithm performs multiplication ...
- research-articleAugust 2024
Image encryption using dynamic S-boxes generated using elliptic curve points and chaotic system
- Laiphrakpam Dolendro Singh,
- Akash Lahoty,
- Chanubala Devi,
- Deepjoy Dey,
- Punyabrat Saikai,
- Khumukcham Sonam Devi,
- Khoirom Motilal Singh
Journal of Information Security and Applications (JISA), Volume 83, Issue Chttps://doi.org/10.1016/j.jisa.2024.103793AbstractImages play a vital role in almost all sectors, including medical, video conferencing, weather forecasting, military applications, and most common social media applications. Today’s proliferating technology provides attackers an opportunity to ...
- research-articleJuly 2024
Solving modular cubic equations with Coppersmith's method
AbstractSeveral cryptosystems based on Elliptic Curve Cryptography such as KMOV and Demytko process the message as a point M = ( x 0 , y 0 ) of an elliptic curve with an equation of the form y 2 ≡ x 3 + a x + b ( mod n ) over a finite field when n is a ...
- research-articleJune 2024
Securing Decentralized Storage in Blockchain: A Hybrid Cryptographic Framework
Cybernetics and Information Technologies (CYBAIT), Volume 24, Issue 2Pages 16–31https://doi.org/10.2478/cait-2024-0013AbstractThe evolution of decentralized storage, propelled by blockchain advancements, has revolutionized data management. This paper focuses on content security in the InterPlanetary File System (IPFS), a leading decentralized storage network lacking ...
- research-articleJuly 2024
NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce
AbstractThe rise of payment details theft has led to increasing concerns regarding the security of e-commerce platforms. For the MageCart threat family, the attacks employ e-skimmers, which are pieces of software code that instruct clients to forward ...
- research-articleApril 2024
An efficient group signature based certificate less verification scheme for vehicular ad-hoc network
Wireless Networks (WIRE), Volume 30, Issue 5Pages 3269–3298https://doi.org/10.1007/s11276-024-03709-1AbstractVehicular ad-hoc network (VANET) is widely applied in transportation applications to ensure safety and security during road transportation. In VANET, all the information’s are interchanged among vehicles with the available infrastructure on the ...
- research-articleJuly 2024
An ECC with error detection and against side channel attacks for resource constrained devices
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 36, Issue 4https://doi.org/10.1016/j.jksuci.2024.102019AbstractAs more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional ...
- research-articleMay 2024
3S-ALDDT: A Triple Security Scheme for Authenticating Lightweight Devices and Securing Data Transmission in Internet of Things
Wireless Personal Communications: An International Journal (WPCO), Volume 135, Issue 2Pages 727–762https://doi.org/10.1007/s11277-024-11051-0AbstractThe Internet of Things (IoT) connect and link objects and people for creating, processing and sharing countless information. The use of IoT is widely spread in important life fields like smart farming, by collecting and transferring data from ...
- research-articleFebruary 2024
A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing
Future Generation Computer Systems (FGCS), Volume 151, Issue CPages 162–181https://doi.org/10.1016/j.future.2023.09.032AbstractThe Internet of Medical Things (IoMT) is the network of medical devices, software applications, and healthcare information systems used for remote monitoring and delivery of healthcare services. Despite the several advantages of IoMT for today ...
Highlights- The framework incorporates scalable and lightweight group authentication over blockchain for a fog-based IoMT system.
- The framework utilizes the efficient SSS algorithm and ECC technique to implement the authentication scheme.
- The ...
- articleFebruary 2024
Security in wireless body area networks via anonymous authentication: Comprehensive literature review, scheme classification, and future challenges
AbstractAuthentication is a security practice that seeks to validate a user identity to various entities, yet doing so across a wireless network poses inherent risks. Wireless Body Area Networks (WBANs) are a unique form of network that contains e-...
- research-articleJanuary 2024
Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 28, Issue 3Pages 2671–2681https://doi.org/10.1007/s00500-023-09585-9AbstractThe industrial internet of things (IIoT) refers to a system of interconnected equipment, sensors, and devices deployed within industrial environments whose primary function is to collect and facilitate the exchange of data. IIoT has gained ...
- ArticleDecember 2023
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things
AbstractHealthcare Internet of Things (HIoT) systems are a step forward in improving the efficiency and quality of patients’ vital information. The HIoT system collects, encrypts, and outsources the patients’ sensitive data over the cloud server for ...