2021
DOI: 10.1007/s11277-021-09244-y
|View full text |Cite
|
Sign up to set email alerts
|

Pairing-Free Identity-Based Digital Signature Algorithm for Broadcast Authentication Based on Modified ECC Using Battle Royal Optimization Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…The focus of this study (Kumar & Ray, 2022) and utilizes the Battle Royal Optimization Algorithm. The main objective of this algorithm is to provide secure data transfer for message authentication while increasing authentication speed, reducing signature size, and speeding up signature verification.…”
Section: Previous Work Related To Security In Wsnmentioning
confidence: 99%
See 1 more Smart Citation
“…The focus of this study (Kumar & Ray, 2022) and utilizes the Battle Royal Optimization Algorithm. The main objective of this algorithm is to provide secure data transfer for message authentication while increasing authentication speed, reducing signature size, and speeding up signature verification.…”
Section: Previous Work Related To Security In Wsnmentioning
confidence: 99%
“…To provide less communication and computation costs, lightweight signature algorithms are used to provide more security at each step and enhance the performance of the network. The PF-IBDS algorithm (Kumar & Ray, 2022), based on ECC using or broadcast authentication, is presented as a secure authentication protocol in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…Following this, herein, we would like to highlight the most recently used signature-basedauthentication techniques that have demonstrated remarkable results. Kumar et al [107] proposed a Pairing-Free Identitybased Digital Signature (PF-IBDS) scheme for WSN applications utilizing the Modified Elliptic Curve Cryptography (MECC) and Battle Royal Optimization Algorithm (BROL). The objective of this model was to ensure data security during communication among sensors followed by a remote destination operator.…”
Section: E Cryptography and Non-cryptography Based Solutionsmentioning
confidence: 99%
“…e edge node feeds back the data directly to the smart contract. If it is a multilateral case, the data block of the above method is insufficient and the nodes need to be used to calculate the surrounding nodes [24]. Suppose there are t edge nodes, and the data block index set of each node is represented by O j .…”
Section: Edge Computationmentioning
confidence: 99%