Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2018, International Journal of E-services and Mobile Applications
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-today life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (external party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows–Abadi–Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.
2016
The communication model of Internet of Things (IOT) includes networks infrastructure (e.g. ultra-wideband networks, 3G and 4G networks). It also includes the adoption of IPv6 in order to provide a unique IP address to any entity involved in the network. It also comprises technologies that allow the location and identification of physical objects (e.g. RFID). There are also some other technologies that influence on the successful development of IoT applications. These technologies are computer vision, biometric systems, robotics, and others. In this paper, an elliptic curve on-line/off-line threshold digital signature scheme for Internet of Things is presented. In the proposed scheme, there are two phases for computing the digital signature of a message: off-line phase and on-line phase. The majority of the digital signature computation is performed offline which saves power and time. We also prove that our proposed schemes have achieved the desired security requirements. Extensive s...
Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.
Computers, Materials & Continua
Journal of Sensor and Actuator Networks
As an extension of the wired network, the use of the wireless communication network has considerably boosted users’ productivity at work and in their daily lives. The most notable aspect of the wireless communication network is that it overcomes the constraints of the wired network, reduces the amount of cost spent on wire maintenance, and distributes itself in a manner that is both more extensive and flexible. Combining wireless communication with the Internet of Things (IoT) can be used in several applications, including smart cities, smart traffic, smart farming, smart drones, etc. However, when exchanging data, wireless communication networks use an open network, allowing unauthorized users to engage in communication that is seriously destructive. Therefore, authentication through a digital signature will be the best solution to tackle such problems. Several digital signatures are contributing to the authentication process in a wireless communication network; however, they are s...
Academia Biology, 2023
Introduction: Sesamum alatum is a herb, sometimes considered a weed, common in African and Asian countries. It is used as a food and medicine but receives little attention in the scientific literature. Therefore, studying it for more effective and sustainable use is essential. Objective: To describe biological, geo-ecological, cultivation, and utilization features of S. alatum.Review methods: The study reviewed material from the online catalog JSTOR Global Plants, scientific articles, and other scholarly sources. It was conducted in Atlas.ti using the codes “description,” “taxonomy,” “ecology and distribution,” “production,” “food value,” and “medicinal value.” Then, the resulting quotes were compiled into coherent text. Results: S. alatum is an erect, herbaceous plant with lanceolate leaves, pentameric flowers with spotted reddish colors, elongated capsular fruit, and dark-winged seeds. The plant occurs in savannas, villages, or roadsides of tropical Africa, the Near East, and Tamil Nadu. Some rural communities grow the plant, and the hybrid S. alatum × S. indicum increases sesame’s resistance to phyllodes. Leaves and seed oil have culinary and medicinal values. S. alatum inhibits the growth of Escherichia coli, Pseudomonas cepacia, and Staphylococcus epidermis, exhibits antidiabetic, antinephropic, antidiarrheal, and aphrodisiac properties, and helps treat infertility in women and cattle. Conclusions: A cost–benefit analysis for the use of S. alatum as a food and plant therapeutic resource suggests that it would be unwise not to harness it, considering its high level of spontaneous anthropogenic dissemination, its nutritional value, potential as an antimicrobial, antidiarrheal, and antidiabetic agent, and evidence of its benefits in sexual and reproductive health.
Selected Factum Foundation Projects Carried Out Between 2019 and 2023 (edited by Adam Lowe, with Nicolas Béliard, Giulia Fornaciari, Ferdinand Saumarez Smith, Otto Lowe, Jorge Cano and Carlos Bayod) (Madrid: Factum Foundation, 2023), pp. 122-125
Reprints of papers published on lunar crescent visibility, prayer-times and sacred direction in historical Islam. Includes papers on the orientation of the Kaaba and sacred geography, the earliest mathematical methods for finding the qibla, universal mathematical and instrumental solutions in spherical astronomy, and a survey of astronomical timekeeping and the regulation of the prayer-times.
Il Manifesto: Global Edition (10 June 2018), 2018
Relacje Międzykulturowe, 2023
Swiss Journal of Sociocultural Anthropology-SJSCA, 2023
Blätter für deutsche und internationale Politik, 2023
International Journal for Numerical Methods in Engineering, 2009
Journal of Philosophy and Ethics, 2018
Journal of Experimental Botany, 2009
Mantiqu Tayr: Journal of Arabic Language, 2021
… Venezolana de Sociología y Antropología, 2008