[HTML][HTML] Lightweight public key infrastructure for the Internet of Things: A systematic literature review

M El-Hajj, P Beune - Journal of Industrial Information Integration, 2024 - Elsevier
Abstract The Internet of Things (IoT) has transformed everyday environments into
interconnected cyber–physical systems, enabling automation and assistance for diverse …

Secure communication in UAV assisted HetNets: a proposed model

A Rashid, D Sharma, TA Lone, S Gupta… - Security, Privacy, and …, 2019 - Springer
In the current scientific and technological world, every emerging/advanced country employs
Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its …

Serial communication protocol with enhanced properties–securing communication layer for smart sensors applications

J Dudak, G Gaspar, S Sedivy, P Fabo… - IEEE Sensors …, 2018 - ieeexplore.ieee.org
The essential component of all the control and sensory systems is a communication layer.
The MODBUS protocol used in automation and sensory industry defines a simple format of …

Applications of identity-based cryptography in smart home and healthcare: A recent review

S Garg, S Nayak, AB Bavani Sankar, S Maity - Cyber Security in Intelligent …, 2022 - Springer
Advancement in technology has led to an exponential growth of Internet of Things (IoT)
devices. IoT devices make our lives easier by providing all the advantages in relation to …

The case for federated identity management in 5G communications

EKK Edris, M Aiash, JKK Loo - 2020 Fifth International …, 2020 - ieeexplore.ieee.org
The heterogeneous nature of fifth generation mobile network (5G) makes the access and
provision of network services very difficult and raises security concerns. With multi-users and …

Lightweight public key infrastructure for IoT

PF Beune - 2023 - essay.utwente.nl
The term Internet of Things (IoT) refers to real-world physical objects that have sensors,
computing power, and software that may communicate to other systems and devices over …

Identity-based encryption in UAV assisted HetNets: A survey

A Rashid, D Sharma, TA Lone, S Gupta… - 2019 10th …, 2019 - ieeexplore.ieee.org
In this modern technological world, the Unmanned Ariel Vehicle (UAV) assisted
Heterogeneous Networks (HetNets) is almost being used by every develo**/developed …

Implementation of a strongly robust identity-based encryption scheme over type-3 pairings

H Okano, K Emura, T Ishibashi, T Ohigashi… - International Journal of …, 2020 - jstage.jst.go.jp
1.1 Background Public-key encryption (PKE) is an important mechanism for maintaining
security in several organizations. Identity-based encryption (IBE)[52] is an extension of PKE …

Towards indeterminacy-tolerant access control in iot

M Heydari, A Mylonas, V Katos, D Gritzalis - Handbook of Big Data and IoT …, 2019 - Springer
The ultimate goal of any access control system is to assign precisely the necessary level of
access (ie, no more and no less) to each subject. Meeting this goal is challenging in an …

Sm9 digital signature with non-repudiation

M Wang, Y Long - 2020 16th International Conference on …, 2020 - ieeexplore.ieee.org
SM9 is an identity-based cryptography algorithm published by the State Cryptography
Administration of China. With SM9, a user's private key for signing is generated by a central …