2020
DOI: 10.1049/iet-its.2019.0855
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic keys exchange model for smart city applications

Abstract: This study presents a secret key sharing protocol that establishes cryptographically secured communication between two entities. A new symmetric key exchange scenario for smart city applications is presented in this research. The protocol is based on the specific properties of the Fuss‐Catalan numbers and the Lattice Path combinatorics. The proposed scenario consists of three phases: generating a Fuss‐Catalan object based on the grid dimension, defining the movement in the Lattice Path Grid and defining the ke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 46 publications
(20 citation statements)
references
References 28 publications
0
20
0
Order By: Relevance
“…Taking the road with ID 1 as an example, each Cell is numbered from 0 to K in the east direction in Figure 1, such that the first Cell (at the intersection) is numbered 0. Taking the ID information of the road into consideration, we use A crash occurred on C 3 1 at the time ξ, which leads to a traffic jam heading east, is shown in Figure 1. For simplicity, we assume that all vehicles travel at a constant speed.…”
Section: Candidate Location Analysis Of Rsudmentioning
confidence: 99%
See 4 more Smart Citations
“…Taking the road with ID 1 as an example, each Cell is numbered from 0 to K in the east direction in Figure 1, such that the first Cell (at the intersection) is numbered 0. Taking the ID information of the road into consideration, we use A crash occurred on C 3 1 at the time ξ, which leads to a traffic jam heading east, is shown in Figure 1. For simplicity, we assume that all vehicles travel at a constant speed.…”
Section: Candidate Location Analysis Of Rsudmentioning
confidence: 99%
“…When R 0 1 receives this message, it will disseminate the data packet in all directions, helping vehicles heading to its destination passing by road with ID 1 to reroute. The road sequence of the packet dissemination is: C 3 1 → C 2 1 → C 1 1 → C 0 1 . We will discuss the process of message dissemination in the case of RSUs (in Section 3.1) and no RSUs (in Section 3.2) in Cells, respectively.…”
Section: Candidate Location Analysis Of Rsudmentioning
confidence: 99%
See 3 more Smart Citations