A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography

D Sadhukhan, S Ray, MS Obaidat… - Journal of Systems …, 2021 - Elsevier
In last few decades, smart-grid architecture has evolved as a new power service provider
that can accomplish regulations of power generation with significant capabilities to monitor …

IoT Authentication Protocols: Challenges, and Comparative Analysis

AN Alsheavi, A Hawbani, W Othman, X Wang… - ACM Computing …, 2025 - dl.acm.org
In the ever-evolving information technology landscape, the Internet of Things (IoT) is a
groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an …

ECC-CoAP: Elliptic curve cryptography based constraint application protocol for internet of things

S Majumder, S Ray, D Sadhukhan, MK Khan… - Wireless Personal …, 2021 - Springer
Abstract Constraint Application Protocol (CoAP), an application layer based protocol, is a
compressed version of HTTP protocol that is used for communication between lightweight …

An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing

U Chatterjee, S Ray, MK Khan, M Dasgupta, CM Chen - Computing, 2022 - Springer
Fog computing is a computing structure which is distributed in nature. Low latency,
reasonably low communication overhead and ability to support real time applications are the …

A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things

D Rangwani, D Sadhukhan, S Ray, MK Khan… - Peer-to-peer Networking …, 2021 - Springer
Wireless sensor networks (WSNs) accomplish a key aspect in the Industrial Internet of
Things (IIoT) that has turned out to be the most flourishing perception for computerizations in …

An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC

U Chatterjee, S Ray, S Adhikari, MK Khan… - Computer …, 2023 - Elsevier
Wireless sensor network (WSN) is used for sensing data/information from the nearby
environment with the help of various spatially dispersed miniature sensor devices/nodes …

Security and integrity attacks in named data networking: a survey

MSM Shah, YB Leau, M Anbar, AA Bin-Salem - IEEE Access, 2023 - ieeexplore.ieee.org
The notion of Information-Centric Networking (ICN) specifies a new communication model
that emphasis on the content exchanged rather than the devices connected. ICN …

An improved authentication and key management scheme for hierarchical IoT network using elliptic curve cryptography

U Chatterjee, S Ray, D Sadhukhan… - Innovations in Systems …, 2023 - Springer
Abstract Internet of Things (IoT) is one of the dominant research topics in recent era. With the
advent of Industrial IoT, smart grid, smart home, IoT in Health services that attracts a lot of …

A hybrid security scheme for inter-vehicle communication in content centric vehicular networks

R Tandon, PK Gupta - Wireless Personal Communications, 2023 - Springer
Content centric networking is one of the emerging paradigm for inter-vehicle communication
that focuses on the contents being shared within the network. In this paper, we have …

ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet

S Adhikari, S Ray, MS Obaidat, GP Biswas - Wireless Personal …, 2023 - Springer
Content centric network (CCN) is initially envisaged as a next generation Internet paradigm
to cope up with the recent growing demand of content delivery. CCN reduces the network …