2022
DOI: 10.3390/app12157575
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment

Abstract: Across the globe, wireless devices with Internet facilities such as smartphones and tablets have become essential assets for communication and entertainment alike for everyday life for millions of people, which increases the network traffic and the demand for low-latency communication networks. The fourth-generation (4G)/long-term evolution (LTE)/ fifth-generation (5G) communication technology offers higher bandwidth and low latency services, but resource utilization and resiliency cannot be achieved, as trans… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 23 publications
1
2
0
Order By: Relevance
“…To that end, the AAL area of research is aggressively growing, and massive projects have already been launched to facilitate the growth of novel AAL systems, with the goal of providing multiple functionalities to the intended audience. This is further evidence of a strong industry in the studied area [11].…”
Section: Introductionsupporting
confidence: 69%
See 1 more Smart Citation
“…To that end, the AAL area of research is aggressively growing, and massive projects have already been launched to facilitate the growth of novel AAL systems, with the goal of providing multiple functionalities to the intended audience. This is further evidence of a strong industry in the studied area [11].…”
Section: Introductionsupporting
confidence: 69%
“…Numerous technologies have been established to create the utilization of assistive technology that is more acceptable as well as convenient for elderly people, with the goal of reducing or even replacing human help and support. Nevertheless, there are several numbers of challenges, particularly in the engagement of the elderly with assistive processes [11]. Ambient assisted living as well as ambient intellectual capacity has had a significant impact, particularly in the past few decades.…”
Section: Introductionmentioning
confidence: 99%
“…Attackers intercept and manipulate TCP packets, impersonating one of the communicating parties to gain unauthorized access to sensitive information or inject malicious payloads into the communication stream 167], [168]. Session hijacking is particularly concerning because it can occur without the parties' knowledge, enabling attackers to eavesdrop on confidential conversations, steal credentials, or tamper with data exchanges [169]. This vulnerability underscores the importance of implementing robust cryptographic protocols to authenticate and secure TCP connections.…”
Section: Common Vulnerabilities In Tcpmentioning
confidence: 99%