4.6 Article

A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Marine

A resource friendly authentication scheme for space-air-ground-sea integrated Maritime Communication Network

Muhammad Asghar Khan et al.

Summary: This study proposes an improved and resource-friendly authentication scheme for maritime communication networks using Elliptic Curve Cryptography (ECC), and validates its security using a formal security assessment method. The findings support the viability of the proposed scheme.

OCEAN ENGINEERING (2022)

Article Telecommunications

Cryptanalysis of Two Signature Schemes for IoT and Mobile Health Systems

Feihong Xu et al.

Summary: Two new signature schemes proposed for IoT and mobile health applications were found to have security vulnerabilities and inability to achieve correctness, making them unsuitable for practical deployment.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Artificial Intelligence

EERBCR: Energy-efficient regional based cooperative routing protocol for underwater sensor networks with sink mobility

Haseena Gul et al.

Summary: The proposed Energy-Efficient Regional base Cooperative Routing (EERBCR) protocol for Underwater Wireless Sensor Networks (UWSNs) enhances network lifetime by dividing the network field into regions, using mobile sinks, and activating nodes based on sink proximity. Simulation results show the superiority of EERBCR over other routing protocols.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Engineering, Marine

Energy-Efficient Collision Avoidance MAC Protocols for Underwater Sensor Networks: Survey and Challenges

Faisal Abdulaziz Alfouzan

Summary: The design of MAC protocols in underwater sensor networks faces challenges like long underwater acoustic propagation delay, high mobility, low available bandwidth, and high error probability. Contention-based MAC protocols are more expensive in UWSNs due to unique acoustic channel characteristics. Effective management of re-transmissions and collisions at the MAC layer is crucial for reducing energy consumption and improving network throughput.

JOURNAL OF MARINE SCIENCE AND ENGINEERING (2021)

Proceedings Paper Computer Science, Information Systems

A Survey on underwater wireless sensor networks: challenges, requirements, and opportunities

S. Sandhiyaa et al.

Summary: Recent attention has been focused on the fields of Underwater Wireless Sensor Networks (UWSN) and Underwater Acoustical Sensor Networks (UASNs). This study evaluates the current situation in these areas and provides an overview of the latest results in UWSN data. The necessity for durable and adaptable technologies to meet the fast growth of UWSN's, along with the identification of key criteria and essential components, are addressed in this research. Furthermore, key unsolved problems are highlighted as a roadmap for future research paths.

PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021) (2021)

Article Automation & Control Systems

Cryptanalysis of an Online/Offline Certificateless Signature Scheme for Internet of Health Things

Saddam Hussain et al.

Summary: The study presents a new signature scheme for Internet of Health Things, claiming formal security under ROM but being insecure against adaptive chosen message attacks. Comparative analysis shows no advantage of the proposed scheme, despite the use of a lightweight cryptographic system.

INTELLIGENT AUTOMATION AND SOFT COMPUTING (2021)

Article Computer Science, Information Systems

A Novel Efficient Certificateless Signature Scheme for the Prevention of Content Poisoning Attack in Named Data Networking-Based Internet of Things

Saddam Hussain et al.

Summary: This article focuses on protecting NDN-based IoT networks from Content Poisoning Attack by proposing a certificateless signature scheme that is formally secure and cost-efficient.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices

Abigail Akosua Addobea et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Article Computer Science, Information Systems

A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things

Manazara Rehman et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Article Health Care Sciences & Services

An Online-Offline Certificateless Signature Scheme for Internet of Health Things

Muhammad Asghar Khan et al.

JOURNAL OF HEALTHCARE ENGINEERING (2020)

Article Computer Science, Theory & Methods

A key distribution scheme for secure communication in acoustic sensor networks

Md. Abdul Hamid et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

Security, Privacy, and Access Control in Information-Centric Networking: A Survey

Reza Tourani et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Automation & Control Systems

Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments

Arijit Karati et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Engineering, Electrical & Electronic

RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements

Yu Luo et al.

IEEE COMMUNICATIONS MAGAZINE (2016)

Article Engineering, Electrical & Electronic

An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks

Chunyan Peng et al.

JOURNAL OF SENSORS (2016)

Article Computer Science, Information Systems

Multi-Criteria Inventory Classification Using a New Method of Evaluation Based on Distance from Average Solution (EDAS)

Mehdi Keshavarz Ghorabaee et al.

INFORMATICA (2015)

Article Chemistry, Analytical

A Secure Communication Suite for Underwater Acoustic Sensor Networks

Gianluca Dini et al.

SENSORS (2012)

Article Mathematics, Applied

A new provably secure certificateless short signature scheme

Kyu Young Choi et al.

COMPUTERS & MATHEMATICS WITH APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

Cantor versus Harley: Optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems

T Wollinger et al.

IEEE TRANSACTIONS ON COMPUTERS (2005)