2020
DOI: 10.3390/s20030758
|View full text |Cite
|
Sign up to set email alerts
|

Reusable Mesh Signature Scheme for Protecting Identity Privacy of IoT Devices

Abstract: The development of the Internet of Things (IoT) plays a very important role for processing data at the edge of a network. Therefore, it is very important to protect the privacy of IoT devices when these devices process and transfer data. A mesh signature (MS) is a useful cryptographic tool, which makes a signer sign any message anonymously. As a result, the signer can hide his specific identity information to the mesh signature, namely his identifying information (such as personal public key) may be hidden to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 49 publications
0
8
0
Order By: Relevance
“…The restriction of data collection is also addressed by article 25 of the GDPR 3 . At the same time, new privacy protection tools evolve, which actively prevent identification through IoT networks, e.g., by means of cryptography ( Gu et al, 2020 ) or are able to detect privacy intrusion or attacks (for review on network intrusion detection systems see Chaabouni et al, 2019 ).…”
Section: Discussionmentioning
confidence: 99%
“…The restriction of data collection is also addressed by article 25 of the GDPR 3 . At the same time, new privacy protection tools evolve, which actively prevent identification through IoT networks, e.g., by means of cryptography ( Gu et al, 2020 ) or are able to detect privacy intrusion or attacks (for review on network intrusion detection systems see Chaabouni et al, 2019 ).…”
Section: Discussionmentioning
confidence: 99%
“…With the development of communication technology and the coming of information age, people are more and more aware of the important role of information security [71][72][73][74][75][76], and the research of various security protection has become the current research hotspot [77][78][79][80][81][82]. As an important part of information security transmission, random number generator (RNG) has been paid more and more attention.…”
Section: Introductionmentioning
confidence: 99%
“…Under duty cycle-based MAC protocol, the length of a duty cycle influences delays most. Usually, the proportion of awake time is greater and delays are shorter, but energy consumption is higher [52][53][54][55].…”
Section: Mac Protocolmentioning
confidence: 99%