RPL is a directing convention for remote organizations with low force utilization and large defenseless to parcel misfortune. It is a proactive convention dependent on distance vectors and works on IEEE 802.15.4. RPL can uphold a wide assortment of connection layers, including IoT, which is a technology that taking hold of research and industries with a fast tramp. It is a collection of actuators and sensors that collect data which can be processed to produce actual information. Important parameters allied to human body and physical environment data such that humidity, temperature, pressure, pollution etc. have immense significance for computerization, failure recognition, well timed, and appropriate cure. In this manner, IoT network offered ascend to keen urban communities, home mechanization, savvy wellbeing, present day travel strategic and some more. There is a distance vector normalization Routing Protocol for Low force and Lossy organization (RPL) for IoT sending, which relies upon different course improvement Objective functions (OF). These capacities rely upon different networks in the vein of energy like Received Sign Strength Indicator (RSSI) and Expected Transmission tally (ETX) for course streamlining. Course enhancement is influenced by issue of burden adjusting. In this paper, an inclusive survey of existing load balancing schemes, matrices, Objective Functions and different RPL based Routing protocols with reference to load imbalance is represented and highlighted when load balancing merged with the RPL, how it had a great impact.
Digital security as a service is a crucial aspect as it deals with user privacy provision and secure content delivery to legitimate users. Most social media platforms utilize end-to-end encryption as a significant security feature. However, multimedia data transmission in group communication is not encrypted. One of the most important objectives for a service provider is to send the desired multimedia data/service to only legitimate subscriber. Broadcast encryption is the most appropriate cryptographic primitive solution for this problem. Therefore, this study devised a construction called anonymous revocable identity-based broadcast encryption that preserves the privacy of messages broadcasted and the identity of legitimate users, where even revoked users cannot extract information about the user’s identity and sent data. The update key is broadcast periodically to non-revoked users, who can obtain the message using the update and decryption keys. A third-party can also revoke the users. It is proven that the proposed construction is semantically secure against IND-ID-CPA attacks and efficient in terms of computational cost and communication bandwidth.
The recent advent of cloud computing provides a flexible way to effectively share data among multiple users. Cloud computing and cryptographic primitives are changing the way of healthcare unprecedentedly by providing real-time data sharing cost-effectively. Sharing various data items from different users to multiple sets of legitimate subscribers in the cloud environment is a challenging issue. The online electronic healthcare system requires multiple data items to be shared by different users for various purposes. In the present scenario, COVID-19 data is sensitive and must be encrypted to ensure data privacy. Secure sharing of such information is crucial. The standard broadcast encryption system is inefficient for this purpose. Multichannel broadcast encryption is a mechanism that enables secure sharing of different messages to different set of users efficiently. We propose an efficient and secure data sharing method with shorter ciphertext in public key setting using asymmetric (Type-III) pairings. The Type-III setting is the most efficient form among all pairing types regarding operations required and security. The semantic security of this method is proven under decisional BDHE complexity assumption without random oracle model.
In the healthcare industry, online data sharing has become increasingly important, but it also raises significant security concerns. To address these concerns, we propose a secure and efficient online data sharing scheme that uses a cryptographic primitive called broadcast encryption with personalised message system. This notion is applicable to many realistic broadcast services that supports IoT and cloud technology. Specifically, in our system, the data owner creates personalized data for each legitimate user in a group and then transmits a common encrypted data for the entire group in a way that completely hides the subscribed user set from outsiders. Only authorized users can recover personalised data, while all authorized consumers can decrypt the common data. Proposed scheme employs shamir secret sharing scheme to fairly distribute and reconstruct secret among various set up authority to prevent the insider attack from malicious setup authority.We highlight the security consideration in such a scenario and capture the security requirements in the security model. Subsequently, we present a concrete scheme, which is proven CPA secure under the decisional bilinear Diffie-Hellman exponent assumption. In addition, it uses asymmetric pairings whereas rest of the schemes used symmetric pairings, which in turn leads to the smaller and constant compact size ciphertext, constant decryption keys, reduced channel requirement, prevent fault attacks on symmetric bilinear map, and, enhanced performance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.