Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
Requirements elicitation is one of the fundamental sub-processes of requirements engineering which is used to find the needs of stakeholders. There are several activities in this sub-process, i.e., identification of s...
详细信息
The general goal of the research is to reduce loss of productivity, failure and downtime and the percentage of waste in production in the company, which is already committed to and successful in applying standards, ra...
详细信息
In recent years, numerous CNN-based light field (LF) image super-resolution (SR) methods have been developed. However, due to the downsampling inconsistency between low-resolution (LR) testing LF images and LR trainin...
详细信息
This paper introduces a Julia package for tackling linear Diophantine systems and related optimization problems using the Polyhedral Omega algorithm. The package integrates partition analysis and polyhedral geometry t...
详细信息
With the rapid and unprecedented growth of textual data in recent years, there is a remarkable need for automatic text summarization models to retrieve useful information from these large numbers of textual documents ...
详细信息
With the recent advances in deep learning and artificial intelligence, vehicular technologies are progressing rapidly toward fully autonomous driving. Critical components of advanced driver assistance systems (ADAS) h...
详细信息
In this paper, we have discussed an innovative method for crafting a one-dimensional photonic crystal (1D PhC) based Optical Band Pass Filter (OBPF) using a Differential Evolution (DE) algorithm. 1D PhC-based OBPF pla...
详细信息
Nowadays, a large amount of data is being generated and these data are usually stored in distributed environments such as cloud, fog, and edge environments. Data replication, which is commonly used to manage large amo...
详细信息
Following a pilot project, which concluded in 2016, the replacement of old energy consuming Traffic Light Systems (TLS) of Nicosia Municipality were the subject of an investigation with regards to the energy saving po...
详细信息
暂无评论