2023
DOI: 10.1016/j.iot.2022.100641
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 63 publications
0
15
0
Order By: Relevance
“…The importance of cyber security in the IoT layer is emphasized in the European Cyber Security strategy [21] as well as studies from both academic and international organizations [22,23]. Research from the literature on the standards, protocols, and technologies used in the IoT space further highlight the fragmentation of the landscape, which in turns introduces additional difficulties in implementing an effective strategy against cyber attacks [24][25][26][27]. Recent advances in the cyber threat mitigation strategies increasingly make use of statistical and machine learning methods, which rely on access to large datasets and real time information from the IoT layer [28][29][30][31].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The importance of cyber security in the IoT layer is emphasized in the European Cyber Security strategy [21] as well as studies from both academic and international organizations [22,23]. Research from the literature on the standards, protocols, and technologies used in the IoT space further highlight the fragmentation of the landscape, which in turns introduces additional difficulties in implementing an effective strategy against cyber attacks [24][25][26][27]. Recent advances in the cyber threat mitigation strategies increasingly make use of statistical and machine learning methods, which rely on access to large datasets and real time information from the IoT layer [28][29][30][31].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The use of a signcryption cryptosystem has eradicated this shortcoming. 35,36 Zheng 13 established the first signcryption system to decrease the computational and transmission costs of separate and different encryption and signature schemes by combining them into a single unit entitled signcryption. It accomplishes both the goals of digital signature and public key encryption at once.…”
Section: Related Workmentioning
confidence: 99%
“…Unauthorized nodes may access sensitive information if the keys cannot be updated. Once a passive malicious KGC appears, the KGC with the master key will be able to decipher any message and forge any signature [27,28], substantially reducing the security of the emergency logistics system. CL-PKC [29] provides an attractive alternative for lightweight identity authentication.…”
Section: Related Workmentioning
confidence: 99%