Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Blockchain-Based Key Management Scheme Using Rational Secret Sharing

    Xingfan Zhao1, Changgen Peng1,2,*, Weijie Tan2, Kun Niu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 307-328, 2024, DOI:10.32604/cmc.2024.047975

    Abstract Traditional blockchain key management schemes store private keys in the same location, which can easily lead to security issues such as a single point of failure. Therefore, decentralized threshold key management schemes have become a research focus for blockchain private key protection. The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security. The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress, but these schemes do not consider participants’ self-interested behavior, and require trusted nodes to keep private key fragments, resulting in a narrow… More >

  • Open Access

    ARTICLE

    Smart Grid Communication Under Elliptic Curve Cryptography

    B. Prabakaran1,*, T. R. Sumithira2, V. Nagaraj3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2333-2347, 2023, DOI:10.32604/iasc.2023.029725

    Abstract Smart Grids (SGs) are introduced as a solution for standard power distribution. The significant capabilities of smart grids help to monitor consumer behaviors and power systems. However, the delay-sensitive network faces numerous challenges in which security and privacy gain more attention. Threats to transmitted messages, control over smart grid information and user privacy are the major concerns in smart grid security. Providing secure communication between the service provider and the user is the only possible solution for these security issues. So, this research work presents an efficient mutual authentication and key agreement protocol for smart grid communication using elliptic curve… More >

  • Open Access

    ARTICLE

    Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes

    S. M. Udhaya Sankar1,*, S. Thanga Revathi2, R. Thiagarajan3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 625-640, 2023, DOI:10.32604/csse.2023.030444

    Abstract An ad-hoc sensor network (ASN) is a group of sensing nodes that transmit data over a wireless link to a target node, direct or indirect, through a series of nodes. ASN becomes a high-risk group for several security exploits due to the sensor node’s limited resources. Internal threats are more challenging to protect against than external attacks. The nodes are grouped, and calculate each node’s trust level. The trust level is the result of combining internal and external trust degrees. Cluster heads (CH) are chosen based on the anticipated trust levels. The communications are then digitally signed by the source,… More >

  • Open Access

    ARTICLE

    Secure Key Management Based Mobile Authentication in Cloud

    S. Shanmuga Priya1, D. Yuvaraj2,*, T. Satyanarayana Murthy3, Varghese S. Chooralil4, S. Navaneetha Krishnan5, P. Banumathy6, P. SundaraVadivel7

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 887-896, 2022, DOI:10.32604/csse.2022.021845

    Abstract Authentication is important to the security of user data in a mobile cloud environment. Because of the server’s user credentials, it is subject to attacks. To maintain data authentication, a novel authentication mechanism is proposed. It consists of three independent phases: Registration, login, and authentication and key agreement. The user registers with the Registration Center (RC) by producing a secret number that isn’t stored in the phone, which protects against privileged insider attacks. The user and server generate a nonce for dynamic user identity and agree on a session secret key for safe communication. The passwords are not stored on… More >

  • Open Access

    ARTICLE

    Decision Tree Based Key Management for Secure Group Communication

    P. Parthasarathi1,*, S. Shankar2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 561-575, 2022, DOI:10.32604/csse.2022.019561

    Abstract Group communication is widely used by most of the emerging network applications like telecommunication, video conferencing, simulation applications, distributed and other interactive systems. Secured group communication plays a vital role in case of providing the integrity, authenticity, confidentiality, and availability of the message delivered among the group members with respect to communicate securely between the inter group or else within the group. In secure group communications, the time cost associated with the key updating in the proceedings of the member join and departure is an important aspect of the quality of service, particularly in the large groups with highly active… More >

  • Open Access

    ARTICLE

    Cost Effective Decentralized Key Management Framework for IoT

    Raja Lavanya*, K. Sundarakantham, S. Mercy Shalinie

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1057-1070, 2022, DOI:10.32604/csse.2022.021052

    Abstract Security is a primary concern in communication for reliable transfer of information between the authenticated members, which becomes more complex in a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique with Multicast and Unicast key management protocol (BMU-IOT) for decentralized networks has been proposed. The first part of the proposed work is to divide the network into clusters where sensors are connected to and is administered by cluster head. Each sensor securely shares its secret keys with the cluster head using unicast. Based on these decryption keys, the… More >

  • Open Access

    ARTICLE

    Lightweight Key Management Scheme Using Fuzzy Extractor for Wireless Mobile Sensor Network

    Eid Rehman1, Ibrahima Kalil Toure2, Kashif Sultan3, Muhammad Asif4, Muhammad Habib1, Najam Ul Hasan5, Oh-Young Song6,*, Aaqif Afzaal Abbasi1

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1695-1712, 2022, DOI:10.32604/cmc.2022.021641

    Abstract

    The mature design of wireless mobile sensor network makes it to be used in vast verities of applications including from home used to the security surveillance. All such types of applications based on wireless mobile sensor network are generally using real time data, most of them are interested in real time communication directly from cluster head of cluster instead of a base station in cluster network. This would be possible if an external user allows to directly access real time data from the cluster head in cluster wireless mobile sensor network instead of accessing data from base station. But this… More >

  • Open Access

    ARTICLE

    Efficient Key Management System Based Lightweight Devices in IoT

    T. Chindrella Priyadharshini1,*, D. Mohana Geetha2

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1793-1808, 2022, DOI:10.32604/iasc.2022.020422

    Abstract The Internet of Things (IoT) has changed our lives significantly. Although IoT provides new opportunities, security remains a key concern while providing various services. Existing research methodologies try to solve the security and time-consuming problem also exists. To solve those problems, this paper proposed a Hashed Advanced Encryption Standard (HAES) algorithm based efficient key management system for internet-based lightweight devices in IoT networks. The proposed method is mainly divided into two phases namely Data Owner (DO) and Data User (DU) phase. The DO phase consists of two processes namely authentication and secure data uploading. In authentication, the registration process consists… More >

Displaying 1-10 on page 1 of 8. Per Page