-
301
Coding-aware secure routing for multi-hop wireless networks
Published 2012-06-01“…To address security issues of DCAR in“coding+routing”discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR)was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems)was extended,and a new logic LS2-RP(LS2 for routing protocol)was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.…”
Get full text
Article -
302
Authentication scheme for multi-cloud environment based on smart card
Published 2018-04-01“…To solve the problem of the access keys stored in a smart card increasing linearly with the number of registered clouds without third party participated in authentication,an authentication scheme was proposed for multi-cloud environment based on smart card.In the proposed scheme,the authentication was realized between user and multiple clouds without third party participation when the smart card only stored two access key.Thus the storage cost of smart card was reduced effectively.Because there was no public key cryptography,the authentication messages was generated by using XOR homomorphic function and Hash function,thus the computational cost of the smart card and the cloud servers was reduced effectively.Moreover,the proposed scheme also didn’t need to store any user’s information on the cloud servers,thereby reducing the storage and management costs of the cloud servers.The security analysis and the performance analysis show that the proposed scheme is able to resist multiple attacks,which is secure and efficient.…”
Get full text
Article -
303
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
Published 2015-09-01“…In this paper, RSA-like public key cryptography is employed to design a mechanism for multiuser broadcast authentication in WSNs. …”
Get full text
Article -
304
-
305
Efficient unpaired data validation and aggregation protocol in industrial Internet of things
Published 2024-10-01“…Within the context of an IIoT environment based on elliptic curve cryptography, homomorphic encryption was emploied to safeguard data privacy and a verification key management scheme was introduced, facilitating secure and efficient unpaired verification. …”
Get full text
Article -
306
Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties
Published 2022-01-01“…To solve the weak chaos in the spatiotemporal chaotic system based on coupled map lattices under some control parameters and the un-uniformity of sequences generated by the coupled map lattices, a two-dimensional pseudo-random coupled map lattices (2D-PRCML) system was proposed.Firstly, the two-dimensional partitioned elementary cellular automata (2D-PECA) was designed to establish pseudo-random coupling.Secondly, iterative results of 2D-PECA were utilized to perturb the 2D-PRCML system.The chaotic behaviors of the proposed system, such as the bifurcation diagram, Kolmogorov-Sinai entropy, were investigated.Moreover, the uniformity of sequences generated by the 2D-PRCML system was discussed, and the correlation coefficients between any two sequences generated by different lattices were acquired.The analyses and tests indicate that the 2D-PRCML system exhibits stronger chaotic behavior.Furthermore, the sequence generated by the proposed system possesses better uniformity, randomness, and unpredictability.The outstanding properties of the 2D-PRCML system prove that it is more suitable for applying in cryptography and chaotic secure communication.…”
Get full text
Article -
307
A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding
Published 2017-01-01“…Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. This paper introduces a new audio cryptosystem based on chaotic maps, hybrid chaotic shift transform (HCST), and deoxyribonucleic acid (DNA) encoding rules. …”
Get full text
Article -
308
Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network
Published 2013-06-01“…With limitations of power and computation capabilities, one of the main challenges to ensure security in BAN is how to generate or distribute a shared key between nodes for lightweight symmetric cryptography. The current research almost exploits the randomness and distinctiveness (characteristics) of physiological signals to solve the key generation problem. …”
Get full text
Article -
309
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01“…Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. …”
Get full text
Article -
310
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01“…The authentication key pair was securely constructed by elliptic curve cryptography, anonymous authentication and key agreement were realized by lightweight methods such as hash functions and XOR operation. …”
Get full text
Article -
311
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
Published 2013-04-01“…When nodes may be compromised, “beyond cryptography” algorithmic solutions must be envisaged to complement the cryptographic solutions. …”
Get full text
Article -
312
An efficient construction of key-dependent substitution box based on chaotic sine map
Published 2019-12-01“…Moreover, the confusion and diffusion properties of cryptography can be achieved by chaos. This article introduces an efficient construction of a key-dependent substitution box based on the mixing property of the chaotic sine map. …”
Get full text
Article -
313
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
Published 2016-12-01“…In this article, we propose an authentication scheme based on symmetric key cryptography, combined with a capability-based access control system, to provide the different stakeholders (residents, recurring guests, or temporary guests) end-to-end secure access to the Internet of Things devices in a smart home, managed by the home owner in an anonymous way. …”
Get full text
Article -
314
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Published 2015-01-01“…This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. …”
Get full text
Article -
315
Encoding and Decoding of Secret Messages Using Matrices.
Published 2023“…Due to the great need of security for passing sensitive information from one person to another or from one organization to another through electronic technology, there is need for cryptography as a solution to this problem. Matrix analysis of one sort or another has for the past century been used in a variety of disciplines to summarize complex aspects of knowledge generation and to provide an eagle's eye perspective of them. …”
Get full text
Thesis -
316
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS
Published 2016-01-01“…The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. …”
Get full text
Article -
317
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory
Published 2024-03-01“…As a novel trend in the world of cryptography, non-classical integer systems, such as neutrosophic or plithogenic integers, are used for encryption and decryption. …”
Get full text
Article -
318
Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users
Published 2025-01-01“…In order to address these issues, this study proposes an integrated approach combining elliptic curve digital signatures with hash functions for data integrity and authentication, Paillier cryptography for confidentiality, and calibrated noise for privacy preservation. …”
Get full text
Article -
319
Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state
Published 2024-10-01“…Quantum secret sharing is an important research branch of quantum cryptography. A novel dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ (Greenberger-Horne-Zeilinger) state was proposed. …”
Get full text
Article -
320
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Published 2016-01-01“…Logistic map-based chaotic cryptography algorithm is used to preserve the privacy of outsourcing data, which has a fast operation speed and a good effect of encryption. …”
Get full text
Article