2020
DOI: 10.1109/jsyst.2019.2921788
|View full text |Cite
|
Sign up to set email alerts
|

PFCBAS: Pairing Free and Provable Certificate-Based Aggregate Signature Scheme for the e-Healthcare Monitoring System

Abstract: Recently, one of the most popular technologies of the modern era, the Internet of Things (IoT) allows the deployment and usage of various real-time test beds for various smart applications. One such application is the e-healthcare in which patients healthcare related data is transmitted to the nearest base station and then to local or remote server as per the requirements. The data related to patients health is sensitive and needs special protection. Therefore, the integrity and authentication of sources of da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 31 publications
(22 citation statements)
references
References 37 publications
0
22
0
Order By: Relevance
“…However, multiple signals transmission in V-MIMO enhances the possibility of snooping and wiretapping as no security measures are considered. Similar security concern has been addressed by symmetric key cryptography and cooperating jamming signals [9]. The cryptography requires higher computational power, energy and costly in key distribution.…”
Section: Introductionmentioning
confidence: 87%
See 1 more Smart Citation
“…However, multiple signals transmission in V-MIMO enhances the possibility of snooping and wiretapping as no security measures are considered. Similar security concern has been addressed by symmetric key cryptography and cooperating jamming signals [9]. The cryptography requires higher computational power, energy and costly in key distribution.…”
Section: Introductionmentioning
confidence: 87%
“…It can be analyzed from the result that increasing value of SINR at the receiving node enhances the secrecy rate in all the schemes. Further, it is clear from the result that the scheme which has not used beamforming and artificial noise (w/oBF+w/oAN) for PLS has worst system secrecy rate in contrast to the scheme which has used only AN technique to provide security in the network [9]. However, the scheme which has employed both beamforming and artificial noise technique (BF+AN) [16] has better performance than the other two schemes i.e., (w/oBF+w/oAN) and (AN).…”
Section: H Robustness Of System Secrecy Rate Over Received Value Of Sinr At Receiver Sidementioning
confidence: 99%
“…According to certificate-based cryptography [59], Type I adversary A I and Type II adversary A II are considered in the security model. A I serves as malicious user and models an outside adversary, A II acts as malicious-but-passive KGC and models an inside adversary.…”
Section: E Security Modelmentioning
confidence: 99%
“…This process can be time-consuming and complex. Identity-based cryptography (IBC) schemes remove these barriers and use public strings such as email addresses or domain names for data encryption and signature verification, instead of digital certificates [ 4 ]. The security of IBC depends on solving some mathematical problems such as integer factorization and discrete logarithms.…”
Section: Introductionmentioning
confidence: 99%