[HTML][HTML] Energy-efficient routing protocols for wireless sensor networks: Architectures, strategies, and performance

TM Behera, UC Samal, SK Mohapatra, MS Khan… - Electronics, 2022 - mdpi.com
Recent developments in low-power communication and signal processing technologies
have led to the extensive implementation of wireless sensor networks (WSNs). In a WSN …

Authentication in cloud-driven IoT-based big data environment: Survey and outlook

M Wazid, AK Das, R Hussain, G Succi… - Journal of systems …, 2019 - Elsevier
Abstract The Internet of Things (IoT) is composed of different networked objects (ie, smart
devices) which are interconnected to gather, process, refine, and exchange meaningful data …

Efficient blockchain-assisted distributed identity-based signature scheme for integrating consumer electronics in metaverse

R Li, Z Wang, L Fang, C Peng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The metaverse has dramatically transformed the traditional online realm and garnered
significant interest from researchers and industry experts. By integrating with consumer …

CL-CPPA: Certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles

J Li, Y Ji, KKR Choo, D Hogrefe - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The conditional privacy-preserving authentication (CPPA) protocol has applications in the
construction of secure Internet of Vehicles (IoV) due to its capability to achieve both privacy …

SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation

G Liu, Z Yan, W Feng, X **g, Y Chen, M Atiquzzaman - Information Fusion, 2021 - Elsevier
In order to evaluate network trust, different intrusion detection methods have been proposed.
However, it is difficult for a single detection node to collect massive data and perform …

Reportcoin: A novel blockchain-based incentive anonymous reporting system

S Zou, J **, S Wang, Y Lu, G Xu - IEEE access, 2019 - ieeexplore.ieee.org
With the widespread popularity of Internet-enabled devices, mobile users can request and
receive messages anytime and anywhere, which facilitates information feedback for smart …

Fully distributed identity-based threshold signatures with identifiable aborts

Y Jiang, Y Zhu, J Wang, X Li - Frontiers of Computer Science, 2023 - Springer
Identity-based threshold signature (IDTS) is a forceful primitive to protect identity and data
privacy, in which parties can collaboratively sign a given message as a signer without …

Efficient obfuscation for encrypted identity-based signatures in wireless body area networks

Y Zhang, D He, Y Li, M Zhang… - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
The rapid development of the Internet of Things has contributed to the emergence of novel
applications in recent years, such as wireless body area networks (WBANs). The latter can …

[PDF][PDF] A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System.

B Alzahrani, A Barnawi, A Irshad… - Computers …, 2022 - engineersplanet.com
Unmanned aerial vehicles (UAVs) have recently attracted widespread attention in civil and
commercial applications. For example, UAVs (or drone) technology is increasingly used in …

Multi-party co-signature scheme based on SM2

L Tan, X Shang, L Zou, H Yang, Y Wen, Z Liu - Plos One, 2023 - journals.plos.org
Two-party collaborative signature scheme is an important cryptographic technology for user
authentication and data integrity protection when using mobile devices for financial and …