2022
DOI: 10.3390/s22145150
|View full text |Cite
|
Sign up to set email alerts
|

A Computationally Efficient Online/Offline Signature Scheme for Underwater Wireless Sensor Networks

Abstract: Underwater wireless sensor networks (UWSNs) have emerged as the most widely used wireless network infrastructure in many applications. Sensing nodes are frequently deployed in hostile aquatic environments in order to collect data on resources that are severely limited in terms of transmission time and bandwidth. Since underwater information is very sensitive and unique, the authentication of users is very important to access the data and information. UWSNs have unique communication and computation needs that a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 32 publications
(60 reference statements)
0
5
0
Order By: Relevance
“…Goyal et al [17] propose a reliable and secure approach by using trusted encryption schemes like HMAC and AES. Ullah et al [18] considered an online/offline signature with a lightweight hyper-elliptic curve cryptosystem to reduce the communicational complexities for UAN communications. Du et al [19] realized a two-way authentication between the node pair of source and destination by PKG (public key generate).…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Goyal et al [17] propose a reliable and secure approach by using trusted encryption schemes like HMAC and AES. Ullah et al [18] considered an online/offline signature with a lightweight hyper-elliptic curve cryptosystem to reduce the communicational complexities for UAN communications. Du et al [19] realized a two-way authentication between the node pair of source and destination by PKG (public key generate).…”
Section: Related Workmentioning
confidence: 99%
“….,Q k } and calculate r(i) ′ AC according to Section B. Then, it verifies the {ID js ,ID jd } as in Equation (18).…”
Section: Generate Authentication Idmentioning
confidence: 99%
See 1 more Smart Citation
“…Computationally Efficient Signature Scheme for UWSNs [82] Secure and efficient signature schemes in UWSNs.…”
Section: Technique Issue Addressed Major Contribution Attack Type Imp...mentioning
confidence: 99%
“…Authors in [82] proposed signature scheme that is a computationally efficient online/offline signature scheme designed for use in underwater wireless sensor networks (UWSNs). The scheme uses elliptic curve cryptography (ECC) and a batch verification technique to reduce the computational overhead of signature verification.…”
Section: Computationally Efficient Signature Scheme For Uwsnsmentioning
confidence: 99%