2021
DOI: 10.1109/access.2020.3046367
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 48 publications
0
10
0
Order By: Relevance
“…Test results showed enhanced performances compared to other related techniques in the literature. In several works due to Meshram et al [3,9,23], efficient and provably secure authentication techniques using extended chaotic maps were proposed. The schemes show robust security features covering low computational and communication costs.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Test results showed enhanced performances compared to other related techniques in the literature. In several works due to Meshram et al [3,9,23], efficient and provably secure authentication techniques using extended chaotic maps were proposed. The schemes show robust security features covering low computational and communication costs.…”
Section: Related Workmentioning
confidence: 99%
“…: h , ch s , and m described performance time for a one-way hash function, a Chebyshev chaotic map operation, a symmetric encryption/decryption operation, and one modular multiplication, respectively. The relations between: ch h , s , m with respect to h ( h = ms) have been known in several works [3,9,33], and γ = 1/2 since γ ∈ [0, 1] [33]). The relationship and order of computational complexity between the metrics are as follows: s ≈ h ch ≈ h , m ≈ h , ch ≈ h ≈ s < m .…”
Section: Performance Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers in the literature [26][27][28][29][30] have introduced and practitioners in the software industry have adopted a wide variety of software security practices, approaches, and methods. In addition, several companies have created maturity models and frameworks to assess the degree of maturity of their software security practices.…”
Section: Introductionmentioning
confidence: 99%
“…The user equipment (UE) and massive MDs are defined in the 3GPP standards. Currently, the scope of 5G applications extends to critical areas such as human-centered MTC [10], ultradense Internet of Things (IoT) [11], vehicular networking [12], automation of industrial processes [13], cybersecurity [14], and more. Therefore, the security and confidentiality of data transmitted over 5G WSN-enabled communication channels should be treated seriously.…”
Section: Introductionmentioning
confidence: 99%