At the moment, digital documents are just as important as paper documents. As a result, authenticity is essential, especially in legal situations and digital forensics. As technology advances, these digital signature algorithms become weaker, necessitating the development of digital authentication schemes capable of withstanding current security threats. This study proposed a scheme based on an asymmetric key cryptosystem and the user’s biometric credentials to generate keys for digital signatures. A single document can be signed by multiple signatories at the same time under this scheme. The primary goal of this article is to create a safe and cost-effective multiignature scheme. To create keys for document signing and verification, the Edwards-curve Digital Signature Algorithm (EdDSA), especially Ed25519, is employed. The Edwards-curve Digital Signature Algorithm is used with blockchain technology to sign crypto wallets. The Python implementation of a scheme that enables platform independence. We performed performance, security, and comparative analysis to ensure maximum usability. The article’s main findings are that the Ed25519 algorithm can be used in blockchain.
In a network, the most common transport protocol is the Transmission Control Protocol. The Transmission Control Protocol comes in many variants like TCP, Tahoe, Reno, NewReno, Vegas, STCP and so on. Each of these variants would work differently in different networks according to the parameters of that network. On the other hand, there are mainly four common routing protocols used in networks like DSDV, DSR, AODV and TORA. In this paper, we have simulated different networks with differing parameters to analyze the behavior of the most common protocols DSDV and AODV with different variants of TCP. By creating different networks in ns2 simulator, we could deeply analyze the behavior of the protocols with these TCP variants in the basis of the amount of packet drops in each case. The lesser the amount of drops the better the algorithm. This paper implicitly analyses which TCP variant has lesser drop rates with which routing protocol.
The most major requirements of wireless networks in the current network context are security, scalability and memory efficiency. Most of the earlier implementations use cryptographic key exchanges alone for imposing security but mostly proved to be less secure with the presence of many attacks like IP-spoofing and masquerading. This is because, the security is present only during communication i.e., only message integrity is ensured and not the user authenticity. Hence we are trying to include an authentication scheme along with the already existing integrity scheme to provide maximum security all through the lifetime of networks. In this paper, we consider different options for providing authentication, analyze them and find which method can be used for producing better results
General TermsWireless Sensor Networks, Security,
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.