Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2018, International Journal of E-services and Mobile Applications
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-today life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (external party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows–Abadi–Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.
2016 •
The communication model of Internet of Things (IOT) includes networks infrastructure (e.g. ultra-wideband networks, 3G and 4G networks). It also includes the adoption of IPv6 in order to provide a unique IP address to any entity involved in the network. It also comprises technologies that allow the location and identification of physical objects (e.g. RFID). There are also some other technologies that influence on the successful development of IoT applications. These technologies are computer vision, biometric systems, robotics, and others. In this paper, an elliptic curve on-line/off-line threshold digital signature scheme for Internet of Things is presented. In the proposed scheme, there are two phases for computing the digital signature of a message: off-line phase and on-line phase. The majority of the digital signature computation is performed offline which saves power and time. We also prove that our proposed schemes have achieved the desired security requirements. Extensive s...
Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.
Computers, Materials & Continua
A Secure and Efficient Signature Scheme for IoT in HealthcareJournal of Sensor and Actuator Networks
An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of ThingsAs an extension of the wired network, the use of the wireless communication network has considerably boosted users’ productivity at work and in their daily lives. The most notable aspect of the wireless communication network is that it overcomes the constraints of the wired network, reduces the amount of cost spent on wire maintenance, and distributes itself in a manner that is both more extensive and flexible. Combining wireless communication with the Internet of Things (IoT) can be used in several applications, including smart cities, smart traffic, smart farming, smart drones, etc. However, when exchanging data, wireless communication networks use an open network, allowing unauthorized users to engage in communication that is seriously destructive. Therefore, authentication through a digital signature will be the best solution to tackle such problems. Several digital signatures are contributing to the authentication process in a wireless communication network; however, they are s...
2021 •
The Internet of things has become part of our day to day life as many more devices are connecting to the internet, the number is increasing rapidly. IoT devices have become the element in our day to day life. Such as many tiny devices are continuously monitoring our health homes and providing sensitive information which can be analyzed and help for decision making. This important data must have enough security. Hence, the security and efficiency of these IoT devices play an important role therefore various efforts are made to make these resource constraint devices highly secure and efficient. Signcryption is one of the techniques to increase efficiency as compare to traditional signature then encryption schemes. Signcryption along with the hyper-elliptic curve (HECC) can reduce the computational cost of the encryption schemes along with the provision of higher security.
Cahiers du Mirror
On the Outside Looking In, On the Inside Looking Out: Tharchin Babu's Two-way 'Mirror' on Twentieth Century Tibet and the World2018 •
Springer eBooks
When Spirituality Becomes Spiritual Labour: Workplace Mindfulness as a Practice of Well-Being and Productivity2022 •
2007 •
INTEREST OF PRE-SERVICE TECHNOLOGY EDUCATION TEACHERS IN STUDENTS’ INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) IN LAGOS STATE.
INTEREST OF PRE SERVICE TECHNOLOGY EDUCATION TEACHERS2023 •
Annals of Clinical and Biomedical Research
Knowledge of hepatitis B virus infection and vaccination status among college of medicine students in Enugu State, south-east, Nigeria2020 •
Helaine Selin (ed.), Encyclopaedia of the History of Science, Technology, and Medicine in Non-Western Cultures, Dordrecht/Boston/London: Kluwer Academic Publishers, pp. 342-344
Gas: Exploitation and Use of Natural Gas in Premodern China1997 •
Studia Socjologiczne
Syndrom oszusta jako składowa doświadczenia awansu społecznegoAquaculture International
Are small-scale freshwater aquaculture farms in coastal areas of Ghana economically profitable?2019 •
Journal of Family Planning and Reproductive Health Care
Removal of non-palpable etonogestrel implants2008 •