Results 11 to 20 of about 5,722 (251)

A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme

open access: yesIET Information Security, 2023
With the deepening of research, how to construct a fully homomorphic signcryption scheme based on standard assumptions is a problem that we need to solve. For this question, recently, Jin et al.
Zhaoxuan Bian   +5 more
doaj   +2 more sources

A Certificateless Online/Offline Signcryption Scheme for Power Terminal Equipment [PDF]

open access: yesJisuanji gongcheng, 2023
With the continuous development of power energy Internet, the power monitoring system has become a key infrastructure responsible for monitoring and controlling the operations of a power system.
Bin LI, Po WU, Dan WANG, Haoyang AN, Debiao HE
doaj   +1 more source

New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [PDF]

open access: yesJisuanji kexue, 2022
Certificateless generalized signcryption (CLGSC) scheme has been widely applied in resource-limited IoT environments for they could not only solve the problems of the certificate management and key escrow,but also serve as encryption,signature,or ...
ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun
doaj   +1 more source

Hybrid lightweight Signcryption scheme for IoT

open access: yesOpen Computer Science, 2021
The information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely. The conventional method to assure integrity, confidentiality, and non-repudiation is to first sign the message and
Sruthi M., Rajasekaran Rajkumar
doaj   +1 more source

Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence‐based secure ad‐hoc on‐demand distance vector algorithm

open access: yesIET Wireless Sensor Systems, Volume 13, Issue 6, Page 201-215, December 2023., 2023
SIS‐AODV consist of Ant Colony Grey Wolf Optimisation (ACGWO) over AODV algorithm to improve network performance while implementing security algorithm over MANET. Analysis results shows maximum performance with the PDR of 98% and throughput of 85%. In addition, end‐to‐end delay is reduced up‐to 25% and routing overhead decrease up‐to 20%. Abstract In a
Anita R. Patil, Gautam M. Borkar
wiley   +1 more source

Improved SRP algorithm and bidirectional heterogeneous LTE‐R authentication key

open access: yesIET Communications, Volume 17, Issue 11, Page 1300-1309, July 2023., 2023
LTE‐R is the next generation of high‐speed railway wireless communication system in China, and its security is of important practical significance to ensure safe operation of trains. Animproved SRP algorithm and a two‐way heterogeneous LTE‐R authentication key agreement scheme are proposed.
Yong Chen, Ting Chang, Wen Liu
wiley   +1 more source

Stochastic Bat Optimization Model for Secured WSN with Energy‐Aware Quantized Indexive Clustering

open access: yesJournal of Sensors, Volume 2023, Issue 1, 2023., 2023
The wireless sensor networks (WSNs) with dynamic topology communication among the sensor nodes is vulnerable to numerous attacks. As they have limited power, there arises a conflict between the complex security scheme and the consumption of energy which are inversely proportional to each other.
J. Paruvathavardhini   +2 more
wiley   +1 more source

Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT

open access: yesJournal of Healthcare Engineering, Volume 2023, Issue 1, 2023., 2023
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie   +5 more
wiley   +1 more source

Securing Topology Control in SDWSNs Using Identity‐Based Cryptography

open access: yesJournal of Sensors, Volume 2023, Issue 1, 2023., 2023
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations.
Rui Wang   +11 more
wiley   +1 more source

Blockchain‐Based Privacy‐Preserving Sensor Data Sharing with Fine‐Grained Authorization in Microgrid

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
Microgrid is a power system that includes various energy sources (e.g., solar panels and wind turbines), where a number of device status and sensing data are collected and transmitted by smart sensors. Based on sensing‐as‐a‐service in microgrid, sensor owners and sensor data consumers can effectively perform data sharing operations.
Jinhu Yu   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy