2018
DOI: 10.1002/ett.3315
| View full text |Cite
|
Sign up to set email alerts
|

Abstract: With the rapid developments in embedded sensor technology, the internet of things (IoT) becomes the most focused research trend in the recent years. However, the integration of such technology into mobile crowdsensing networks results in many security challenges. Data confidentiality and authenticity are the two key privacy concerns in any IoT‐based crowdsensing environment. Focusing on these security issues, we present a new cryptographic protocol to meet those challenges. Our protocol is based on two new sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 49 publications
(73 reference statements)
0
11
0
Order By: Relevance
“…Shortly thereafter, Chow et al 11 proposed a new IBSC to satisfy the properties of public verifiability and forward security functionalities. There are several IBSCs with their applications and security loopholes [12][13][14][15] are studied. Concept of CLSC was primarily introduced by Barbosa and Farshim 4 to resist the key escrow attack in IBSC scheme.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Shortly thereafter, Chow et al 11 proposed a new IBSC to satisfy the properties of public verifiability and forward security functionalities. There are several IBSCs with their applications and security loopholes [12][13][14][15] are studied. Concept of CLSC was primarily introduced by Barbosa and Farshim 4 to resist the key escrow attack in IBSC scheme.…”
Section: Literature Surveymentioning
confidence: 99%
“…Shortly thereafter, Chow et al proposed a new IBSC to satisfy the properties of public verifiability and forward security functionalities. There are several IBSCs with their applications and security loopholes are studied.…”
Section: Introductionmentioning
confidence: 99%
“…Al‐Turjman et al 13 highlights the main privacy and security issues in smart city application architectures, and presents research challenges that still need to be considered in the future to improve performance. Karati and Biswas 14 proposed a new cryptographic protocol to address these challenges in response to the privacy issues of data confidentiality and authenticity in IoT‐based crowd perception environments. It makes use of identity‐based encryption ideas and designated verifier signature schemes, and designs a pairless and random‐free encryption mechanism with small public parameters, which can maintain the anonymity of IoT receivers.…”
Section: Related Researchesmentioning
confidence: 99%
“…With the development of 5G wireless communication technology 1 and the popularization of smart mobile terminals, various heterogeneous objects with autonomous communication capabilities (eg, smart mobile devices, sensors, RFID devices) have been widely used. Consequently, a system of interrelated computing devices called Internet of Things (IoT) network 2 is formed, which consists of smart mobile terminals such as mobile phones, smart tablets, wearable smart devices, and so on. With smart mobile terminals, not only the efficiency of various IoT systems in collecting and exchanging data can be improved, but also the sensory capabilities of wireless communication networks can be enhanced so that the applications of IoT networks can be greatly broadened.…”
Section: Introductionmentioning
confidence: 99%