Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks

    Qingqing Ning, Chunhua Jin*, Zhiwei Chen, Yongliang Xu, Huaqi Lu

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2061-2078, 2023, DOI:10.32604/csse.2023.040483

    Abstract Wireless body area networks (WBANs) are an emerging technology for the real-time monitoring of physiological signals. WBANs provide a mechanism for collecting, storing, and transmitting physiological data to healthcare providers. However, the open wireless channel and limited resources of sensors bring security challenges. To ensure physiological data security, this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption (CP-HRSC) scheme, in which sensors are in a certificateless cryptosystem (CLC) environment, and the server is in a public key infrastructure (PKI) environment. CLC could solve the limitations of key escrow in identity-based cryptography (IBC) and certificate management for public… More >

  • Open Access

    ARTICLE

    NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing

    Asma Ibrahim Hussein1,*, Abeer Tariq MaoLood2, Ekhlas Khalaf Gbashi2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 753-769, 2023, DOI:10.32604/cmc.2023.039804

    Abstract With the advent of quantum computing, numerous efforts have been made to standardize post-quantum cryptosystems with the intention of (eventually) replacing Elliptic Curve Cryptography (ECC) and Rivets-Shamir-Adelman (RSA). A modified version of the traditional N-Th Degree Truncated Polynomial Ring (NTRU) cryptosystem called NTRU Prime has been developed to reduce the attack surface. In this paper, the Signcryption scheme was proposed, and it is most efficient than others since it reduces the complexity and runs the time of the code execution, and at the same time, provides a better security degree since it ensures the integrity of the sent message, confidentiality… More >

  • Open Access

    ARTICLE

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

    Yang Zhao1, Jingmin An1, Hao Li1, Saru Kumari2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 555-575, 2023, DOI:10.32604/cmes.2023.026808

    Abstract The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-time detection and operation control of vehicles and real-time transmission of data and information. In the environment of VSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users, so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, in this paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTAS-ET). The scheme combines fault-tolerant and aggregate signcryption, which not only makes up for… More > Graphic Abstract

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access

    ARTICLE

    Intelligent Optimization-Based Clustering with Encryption Technique for Internet of Drones Environment

    Dalia H. Elkamchouchi1, Jaber S. Alzahrani2, Hany Mahgoub3,4, Amal S. Mehanna5, Anwer Mustafa Hilal6,*, Abdelwahed Motwakel6, Abu Sarwar Zamani6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6617-6634, 2022, DOI:10.32604/cmc.2022.031909

    Abstract The recent technological developments have revolutionized the functioning of Wireless Sensor Network (WSN)-based industries with the development of Internet of Things (IoT). Internet of Drones (IoD) is a division under IoT and is utilized for communication amongst drones. While drones are naturally mobile, it undergoes frequent topological changes. Such alterations in the topology cause route election, stability, and scalability problems in IoD. Encryption is considered as an effective method to transmit the images in IoD environment. The current study introduces an Atom Search Optimization based Clustering with Encryption Technique for Secure Internet of Drones (ASOCE-SIoD) environment. The key objective of… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Signature Scheme for IoT in Healthcare

    Latika Kakkar1, Deepali Gupta1, Sarvesh Tanwar2, Sapna Saxena3, Khalid Alsubhi4, Divya Anand5, Irene Delgado Noya6,7, Nitin Goyal1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6151-6168, 2022, DOI:10.32604/cmc.2022.023769

    Abstract To provide faster access to the treatment of patients, healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient. There is a huge limitation in the sensing layer as the IoT devices here have low computational power, limited storage and less battery life. So, this huge amount of data needs to be stored on the cloud. The information and the data sensed by these devices is made accessible on the internet from where medical staff, doctors, relatives and family members can access this information. This helps in improving the treatment as… More >

  • Open Access

    ARTICLE

    An Effective Signcryption with Optimization Algorithm for IoT-enabled Secure Data Transmission

    A. Chinnappa*, C. Vijayakumaran

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4017-4031, 2022, DOI:10.32604/cmc.2022.027858

    Abstract Internet of Things (IoT) allows several low resources and controlled devices to interconnect, calculate processes and make decisions in the communication network. In the heterogeneous environment for IoT devices, several challenging issues such as energy, storage, efficiency, and security. The design of encryption techniques enables the transmission of the data in the IoT environment in a secured way. The proper selection of optimal keys helps to boost the encryption performance. With this motivation, the study presents a signcryption with quantum chaotic krill herd algorithm for secured data transmission (SCQCKH-SDT) in IoT environment. The proposed SCQCKH-SDT technique aims to effectively encrypts… More >

  • Open Access

    ARTICLE

    Lamport Certificateless Signcryption Deep Neural Networks for Data Aggregation Security in WSN

    P. Saravanakumar1, T. V. P. Sundararajan2, Rajesh Kumar Dhanaraj3, Kashif Nisar4,*, Fida Hussain Memon5,6, Ag. Asri Bin Ag. Ibrahim4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1835-1847, 2022, DOI:10.32604/iasc.2022.018953

    Abstract Confidentiality and data integrity are essential paradigms in data aggregation owing to the various cyberattacks in wireless sensor networks (WSNs). This study proposes a novel technique named Lamport certificateless signcryption-based shift-invariant connectionist artificial deep neural networks (LCS-SICADNN) by using artificial deep neural networks to develop the data aggregation security model. This model utilises the input layer with several sensor nodes, four hidden layers to overcome different attacks (data injection, compromised node, Sybil and black hole attacks) and the output layer to analyse the given input. The Lamport one-time certificateless signcryption technique involving three different processes (key generation, signcryption and unsigncryption)… More >

  • Open Access

    ARTICLE

    Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications

    Usman Ali1,2, Mohd Yamani Idna Idris1,3,*, Jaroslav Frnda4, Mohamad Nizam Bin Ayub1, Roobaea Alroobaea5, Fahad Almansour6, Nura Modi Shagari1, Insaf Ullah7, Ihsan Ali1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2515-2532, 2022, DOI:10.32604/cmc.2022.019800

    Abstract Industrial internet of things (IIoT) is the usage of internet of things (IoT) devices and applications for the purpose of sensing, processing and communicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-related processes to attain more profits. However, such IoT based smart industries need internet connectivity and interoperability which makes them susceptible to numerous cyber-attacks due to the scarcity of computational resources of IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoT environment. In this paper, we propose a… More >

  • Open Access

    ARTICLE

    Novel Image Encryption and Compression Scheme for IoT Environment

    Mesfer Al Duhayyim1, Fahd N. Al-Wesabi2, Radwa Marzouk3, Manar Ahmed Hamza4, Anwer Mustafa Hilal4,*, Majdy M. Eltahir2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1443-1457, 2022, DOI:10.32604/cmc.2022.021873

    Abstract Latest advancements made in the processing abilities of smart devices have resulted in the designing of Intelligent Internet of Things (IoT) environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assisted environment since it contains visual sensors that examine the surroundings from a number of overlapping views by capturing the images incessantly. Since IoT devices generate a massive quantity of digital media, it is therefore required to save the media, especially images, in a secure way. In order to achieve security,… More >

Displaying 1-10 on page 1 of 15. Per Page