2020
DOI: 10.1002/ett.3883
|View full text |Cite
|
Sign up to set email alerts
|

A secure data transmission protocol for cloud‐assisted edge‐Internet of Things environment

Abstract: Cloud-edge (CE) is revolutionizing our modern world with a greater user experience through the Internet of Things (IoT). However, the edge devices, communication bridge between the cloud and users, are repeatedly exhibiting many security flaws which will inevitably lead to massive cyber attacks. Thus, providing a proper security, specifically, the confidentiality and authenticity of sensitive data become a prime focus for many of the researchers. In cryptography, certificateless signcryption (CLSC) is one of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…As far as cryptography is concerned, certificatelesssigncryption (CLSC) is considered as one of the present-day public key techniques that connects the essentials of confidentiality and sensitive data authenticity between users with minimal overhead. In [17], a new datasharing method to ensure safety of data by means of CLSCscheme was proposed. Also, by employing Diffie-Hellman inversion (DHI) both authenticity and confidentially was assured with minimal overhead.…”
Section: Related Workmentioning
confidence: 99%
“…As far as cryptography is concerned, certificatelesssigncryption (CLSC) is considered as one of the present-day public key techniques that connects the essentials of confidentiality and sensitive data authenticity between users with minimal overhead. In [17], a new datasharing method to ensure safety of data by means of CLSCscheme was proposed. Also, by employing Diffie-Hellman inversion (DHI) both authenticity and confidentially was assured with minimal overhead.…”
Section: Related Workmentioning
confidence: 99%
“…However, in an IIoT setting, a malicious sensor can put the entire network at risk, necessitating the use of a robust authentication mechanism [6]. For the purpose of ensuring integrity and authenticity, the digital signature procedure is used [7].…”
Section: Introductionmentioning
confidence: 99%
“…China unfortunately has a significantly aged society. With the increase in the number of elderly people herein referred to as seniors, health monitoring for seniors has become a research hotspot 1‐6 . As bodily functions age, seniors are very likely to physically fall in their daily activities.…”
Section: Introductionmentioning
confidence: 99%
“…With the increase in the number of elderly people herein referred to as seniors, health monitoring for seniors has become a research hotspot. [1][2][3][4][5][6] As bodily functions age, seniors are very likely to physically fall in their daily activities. Studies have shown that among many daily behaviors that endanger the health of seniors, sudden abnormal behaviors (such as falling) are the most harmful when they are home alone.…”
Section: Introductionmentioning
confidence: 99%