2022
DOI: 10.3390/pr10122631
|View full text |Cite
|
Sign up to set email alerts
|

Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things

Abstract: Cybersecurity protocols enable several levels of protection against cyberattacks (digital attacks) that spread across network devices, platform programs, and network applications. On the Internet of Things (IoT), cyberattacks are generally intended to access and change/destroy sensitive information, which may reduce IoT benefits. Moreover, recent IoT systems are experiencing a critical challenge in designing a lightweight and robust cybersecurity mechanism on resource-constrained IoT devices. The cybersecurity… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 39 publications
0
6
0
Order By: Relevance
“…As a result, the general idea of related works in this paper concentrated on group key management in the IIoT networks. Adel et al [10] proposed a shared group secret key (SGSK), which is created based on the token ring concept. This means that the SGSK is forwarded from one node to the next connected node in the group.…”
Section: Related Work On Group Shared Keymentioning
confidence: 99%
See 4 more Smart Citations
“…As a result, the general idea of related works in this paper concentrated on group key management in the IIoT networks. Adel et al [10] proposed a shared group secret key (SGSK), which is created based on the token ring concept. This means that the SGSK is forwarded from one node to the next connected node in the group.…”
Section: Related Work On Group Shared Keymentioning
confidence: 99%
“…The previous literature studies [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26] had several limitations, which can be specified in three facts: Firstly, the group key agreements that were reviewed in the related works were required to broadcast and exchange many messages between the controller and the group members, which might have exposed the group shared key (GSK) and increased the communication and computation costs. Second, some protocols did not consider the group member authentication and message integrity, thereby facilitating the MITM attack.…”
Section: Related Work On Group Shared Keymentioning
confidence: 99%
See 3 more Smart Citations