An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks DOI Creative Commons
Negalign Wake Hundera,

Wang Shumeng,

Dagmawit Mesfin

et al.

Journal of King Saud University - Computer and Information Sciences, Journal Year: 2024, Volume and Issue: 36(5), P. 102044 - 102044

Published: May 4, 2024

The rapid growth of the Internet Things (IoT) has led to an increased deployment unmanned aerial vehicles (UAVs) across various sectors. However, efficiency and security issues are persistently among primary challenges in UAV networks. In addition, significant communication delays can occur when UAVs perform remote tasks far from a command center (CC); some cases, they may be unable communicate with CC. To address these challenges, this paper, efficient online/offline heterogeneous proxy signcryption scheme for secure networks (HOOPSC) is proposed. This enables CC certificateless cryptosystem (CLC) environment delegate nearby ground control station (GCS) act as agent, directly send commands within identity-based (IBC) undertakes then decrypts verifies authenticity confidentiality. proposed scheme, process split into offline online phases, most heavy computations conducted without availability messages during phase. Only light performed phase message available. Moreover, formal proof given random oracle model. Finally, performance analysis reveals that HOOPSC outperforms existing relevant schemes, making it ideal long-range operations

Language: Английский

Secure and Efficient Outsourced Computation in Cloud Computing Environments DOI

Varun Dixit,

Davinderjit Kaur

Journal of Software Engineering and Applications, Journal Year: 2024, Volume and Issue: 17(09), P. 750 - 762

Published: Jan. 1, 2024

Language: Английский

Citations

20

Toward a Secure Smart-Home IoT Access Control Scheme Based on Home Registration Approach DOI Creative Commons
Tsu‐Yang Wu, Qian Meng, Yeh-Cheng Chen

et al.

Mathematics, Journal Year: 2023, Volume and Issue: 11(9), P. 2123 - 2123

Published: April 30, 2023

The extensive application of the Internet Things (IoT) and artificial intelligence technology has greatly promoted construction development smart cities. Smart home as foundation cities can optimize lifestyles. However, users access system through public channels, transmitted information is vulnerable to attack by attackers, privacy data security user will be difficult guaranteed. Therefore, how protect users’ becomes critical. In this paper, we design a provably secure authentication scheme for environment, which ensures that only legitimate use devices. We informal model verify formally analyze correctness Real or Random model. Finally, comparison performance analysis, it proven our higher under similar performance.

Language: Английский

Citations

12

Traditional and Hybrid Access Control Models: A Detailed Survey DOI Open Access
Muhammad Umar Aftab, Ali Hamza, Ariyo Oluwasanmi

et al.

Security and Communication Networks, Journal Year: 2022, Volume and Issue: 2022, P. 1 - 12

Published: Feb. 7, 2022

Access control mechanisms define the level of access to resources among specified users. It distinguishes users as authorized or unauthorized based on appropriate policies. Several traditional and hybrid models have been proposed in previous researches over last few decades. In this study, we provide a detailed survey compare their criteria. This focuses growing literature summarizes it through comparative analysis, identifying limitations illustrating advantages both models. study will help researchers get deep understanding

Language: Английский

Citations

15

Internet of things (IoT) fusion with cloud computing: current research and future direction DOI Open Access
Manzoor Ansari,

Syed Arshad,

Mansaf Alam

et al.

International Journal of Advanced Technology and Engineering Exploration, Journal Year: 2022, Volume and Issue: 9(97)

Published: Dec. 31, 2022

A system that is embedded with a combination of software, electronic components, actuators, sensors, detectors, and wireless connectivity, which enables them to gather data from these objects can be defined as the -IoT‖ [5].An IoT has following prominent characteristics [6, 7]:  technological advancement connected internet via wired or networks so they communicate one another. variety sensor are available for devices, including near-field communication (NFC), Zigbee, radio frequency identification (RFID), Bluetooth, Wi-Fi. The sensors various technologies, long-term evolution (LTE), general packet service (GPRS), third generation mobile telephony (3G), global (GSM).

Language: Английский

Citations

7

An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles DOI
Negalign Wake Hundera, Muhammad Umar Aftab,

Dagmawit Mesfin

et al.

Vehicular Communications, Journal Year: 2024, Volume and Issue: 49, P. 100811 - 100811

Published: June 5, 2024

Language: Английский

Citations

1

Cloud Solutions for Smart Parking and Traffic Control in Smart Cities DOI
Maganti Syamala,

J. Malathi,

Vikash Singh

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2023, Volume and Issue: unknown, P. 169 - 194

Published: Nov. 27, 2023

Urban mobility trends include 5G connectivity, autonomous vehicles, electric and sustainable modes, AI machine learning, drones, air mobility. These technologies enable real-time data exchange, reduce congestion, enhance safety, optimize road capacity, infrastructure planning. learning algorithms provide accurate predictive analytics, adaptive traffic control, personalized services. Cloud computing, IoT, analytics modeling for planning, flow forecasting, demand behavioral analysis. MaaS platforms facilitate seamless integration of while shared services like car-sharing ride-hailing grow, reducing private vehicle ownership promoting efficient resource use. Mobility transforms urban optimization, mixed-use development, smart city integration, guiding transportation layouts, signal placements, parking facilities, neighborhood design.

Language: Английский

Citations

2

An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks DOI Creative Commons
Negalign Wake Hundera,

Wang Shumeng,

Dagmawit Mesfin

et al.

Journal of King Saud University - Computer and Information Sciences, Journal Year: 2024, Volume and Issue: 36(5), P. 102044 - 102044

Published: May 4, 2024

The rapid growth of the Internet Things (IoT) has led to an increased deployment unmanned aerial vehicles (UAVs) across various sectors. However, efficiency and security issues are persistently among primary challenges in UAV networks. In addition, significant communication delays can occur when UAVs perform remote tasks far from a command center (CC); some cases, they may be unable communicate with CC. To address these challenges, this paper, efficient online/offline heterogeneous proxy signcryption scheme for secure networks (HOOPSC) is proposed. This enables CC certificateless cryptosystem (CLC) environment delegate nearby ground control station (GCS) act as agent, directly send commands within identity-based (IBC) undertakes then decrypts verifies authenticity confidentiality. proposed scheme, process split into offline online phases, most heavy computations conducted without availability messages during phase. Only light performed phase message available. Moreover, formal proof given random oracle model. Finally, performance analysis reveals that HOOPSC outperforms existing relevant schemes, making it ideal long-range operations

Language: Английский

Citations

0