A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography
In last few decades, smart-grid architecture has evolved as a new power service provider
that can accomplish regulations of power generation with significant capabilities to monitor …
that can accomplish regulations of power generation with significant capabilities to monitor …
IoT Authentication Protocols: Challenges, and Comparative Analysis
In the ever-evolving information technology landscape, the Internet of Things (IoT) is a
groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an …
groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an …
ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …
compressed version of HTTP protocol that is used for communication between lightweight …
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing
Fog computing is a computing structure which is distributed in nature. Low latency,
reasonably low communication overhead and ability to support real time applications are the …
reasonably low communication overhead and ability to support real time applications are the …
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things
Wireless sensor networks (WSNs) accomplish a key aspect in the Industrial Internet of
Things (IIoT) that has turned out to be the most flourishing perception for computerizations in …
Things (IIoT) that has turned out to be the most flourishing perception for computerizations in …
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC
Wireless sensor network (WSN) is used for sensing data/information from the nearby
environment with the help of various spatially dispersed miniature sensor devices/nodes …
environment with the help of various spatially dispersed miniature sensor devices/nodes …
Security and integrity attacks in named data networking: a survey
The notion of Information-Centric Networking (ICN) specifies a new communication model
that emphasis on the content exchanged rather than the devices connected. ICN …
that emphasis on the content exchanged rather than the devices connected. ICN …
An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography
Abstract Internet of Things (IoT) is one of the dominant research topics in recent era. With the
advent of Industrial IoT, smart grid, smart home, IoT in Health services that attracts a lot of …
advent of Industrial IoT, smart grid, smart home, IoT in Health services that attracts a lot of …
A hybrid security scheme for inter-vehicle communication in content centric vehicular networks
Content centric networking is one of the emerging paradigm for inter-vehicle communication
that focuses on the contents being shared within the network. In this paper, we have …
that focuses on the contents being shared within the network. In this paper, we have …
ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet
Content centric network (CCN) is initially envisaged as a next generation Internet paradigm
to cope up with the recent growing demand of content delivery. CCN reduces the network …
to cope up with the recent growing demand of content delivery. CCN reduces the network …