2012 Third International Conference on Emerging Security Technologies 2012
DOI: 10.1109/est.2012.43
|View full text |Cite
|
Sign up to set email alerts
|

An ICMetrics Based Lightweight Security Architecture Using Lattice Signcryption

Abstract: The advent of embedded systems has completely transformed the information landscape. With the explosive growth in the use of interactive real-time technologies, this internet landscape aims to support an even broader range of application domains. The large amount of data that is exchanged by these applications has made them an attractive target for attacks. Thus it is important to employ security mechanisms to protect these systems from attackers. A major challenge facing researchers is the resource constraine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…One of the prominent is the integration of ICMetrics into an intelligent wheel chair formally known as the SYSIASS project [9]. Research has also been done on how ICMetrics can be incorporated into specialized areas like document archival in cloud computing [10] and also wireless sensor networks [17].Concurrent work is also underway that promotes the use of ICMetrics in one to one communications [11]. But until now no work has been done on the use of ICMetrics for secure group communications.…”
Section: State Of the Artmentioning
confidence: 99%
“…One of the prominent is the integration of ICMetrics into an intelligent wheel chair formally known as the SYSIASS project [9]. Research has also been done on how ICMetrics can be incorporated into specialized areas like document archival in cloud computing [10] and also wireless sensor networks [17].Concurrent work is also underway that promotes the use of ICMetrics in one to one communications [11]. But until now no work has been done on the use of ICMetrics for secure group communications.…”
Section: State Of the Artmentioning
confidence: 99%
“…The use of a hash function thus converts a length of text into seemingly random text outputs. This means that no matter how big the original text is the hash algorithm produces a single output of a relatively smaller length of text [10] [11]. Hashing has been used for many purposes like to verify if a file/ text has been modified.…”
Section: A Hash Functionsmentioning
confidence: 99%
“…After each ICMetric key generation stage the produced ICMetric key [13] is temporary and exists only locally, and the reproduction of the ICMetric key once again takes place from measurable characteristics of the integrated circuit [10]. The ICMetric key is generated each time it is requested for identification or encryption functions.…”
Section: B Icmetricsmentioning
confidence: 99%