2021
DOI: 10.1016/j.comcom.2021.04.021
|View full text |Cite
|
Sign up to set email alerts
|

3P-SAKE: Privacy-preserving and physically secured authenticated key establishment protocol for wireless industrial networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…The Blockchain-enabled IoMT provides increased security to the data transfer. Maintenance of health data on the daily basis may provide certain features such as new data creation, update records, and provide better security [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40]. By using electronic healthcare records (EHRs), the system enhances the services for both the public and patients.…”
Section: More Centralized Processmentioning
confidence: 99%
“…The Blockchain-enabled IoMT provides increased security to the data transfer. Maintenance of health data on the daily basis may provide certain features such as new data creation, update records, and provide better security [26][27][28][29][30][31][32][33][34][35][36][37][38][39][40]. By using electronic healthcare records (EHRs), the system enhances the services for both the public and patients.…”
Section: More Centralized Processmentioning
confidence: 99%
“…A feature vector has been generated from the preprocessed image using fuzzy clustering approach [38][39][40][41][42]. It is an unsupervised learning method that identifies the similarity of pixel values without knowing the attribute label used in the cluster overlapping of the image pixel [43][44][45][46][47][48].…”
Section: Feature Extraction Fuzzy Clustering (Fuzzy C Means)mentioning
confidence: 99%
“…In the aspect of homomorphic encryption, Singh et al 20 proposed a privacy‐preserving scheme for a smart grid, using homomorphic encryption to provide authentication services for aggregation providers and meters, and improving the traditional data aggregation architecture based on blockchain and cloud computing architecture to improve the security of the scheme, which has high computational efficiency, but the attack resistance of nodes in this scheme needs to be further explored. In addition, Masud et al 21 proposed a privacy‐preserving and physically secured authenticated key establishment scheme for wireless industrial networks, based on Physically Unclonable Function to improve the attack resistance of the scheme, and designed authentication mechanisms and key protocols to improve system security and anonymity, but the central nodes such as gateways in the scheme will cause large losses if they are attacked. The information encryption mechanism enables the encrypted transmission of private data, but the resource loss caused by data encryption needs to be further addressed and explored.…”
Section: Related Workmentioning
confidence: 99%