- Cryptography and Data Security
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Cloud Data Security Solutions
- Cryptographic Implementations and Security
- Blockchain Technology Applications and Security
- Privacy-Preserving Technologies in Data
- Vehicular Ad Hoc Networks (VANETs)
- Cryptography and Residue Arithmetic
- IoT and Edge/Fog Computing
- Physical Unclonable Functions (PUFs) and Hardware Security
- Complexity and Algorithms in Graphs
- Caching and Content Delivery
- Coding theory and cryptography
- Security and Verification in Computing
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Mobile Ad Hoc Networks
- Biometric Identification and Security
- Bluetooth and Wireless Communication Technologies
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- Security in Wireless Sensor Networks
- Wireless Body Area Networks
- Software-Defined Networks and 5G
National Sun Yat-sen University
2018-2024
NIIT University
2017-2018
NIIT (India)
2017-2018
Indian Institute of Technology Dhanbad
2015-2017
In recent years, two technologies, the cloud computing and Internet of Things (IoT), have a synergistic effect in modern organizations as digitization is new business trend for various industries. Therefore, many outsource their crowdsourced industrial-IoT (IIoT) data system to reduce management overhead. However, authentication one fundamental security/trust requirements such IIoT network. The certificateless signature (CLS) scheme cryptographic primitive that provides authenticity systems....
The so-called Internet of Vehicle (IoV) systems will interconnect numerous vehicles to communicate significant information through an Things (IoT) enabled network. It has emerged as a promising system wherein various data authentication techniques have been introduced using clumsy certificate management and Diffie-Hellman (DH) assumption. However, in the presence quantum cryptanalysis, DH-type problems could be solved polynomial-time. In this paper, novel certificateless protocol is...
Nowadays, the Internet of Things (IoT) and cloud computing have become more pervasive in context industry as digitization becomes a business priority for various organizations. Therefore, industries outsource their crowdsourced Industrial IoT (IIoT) data order to reduce cost sharing computation. However, privacy such this environment has attracted wide attention across globe. Signcryption is significant cryptographic primitive that meets both requirement authenticity confidentiality among...
The Internet of Things (IoT) is revolutionizing our modern lives by introducing active connection between smart devices. However, IoT devices are repeatedly exhibiting many security flaws, which will inevitably lead to eavesdropping and impersonation attacks. Thus, providing a proper in becomes prime focus for the researchers. In cryptography, certificateless signcryption (CLSC) one recent public key techniques requirements authenticity confidentiality any message parties. this article, new...
The concept of two-factor multiserver authentication protocol was developed to avoid multiple number registrations using smart-cards and passwords. Recently, a variety protocols have been developed. It is observed that the existing RSA-based are not suitable in terms computation complexities security attacks. To provide lower resilience against known attacks, this article proposes (password smart-card) user with RSA cryptosystem for environments. comprehensive discussion proved attacks...
Over the past few years, Internet of Things (IoT) has played a crucial role in designing e-health systems. An IoT-enabled system allows different entities to examine patient's health condition anywhere and anytime. However, deployment systems an IoT environment faces various security privacy challenges. The authentication participating entities, confidentiality information transferred through insecure channel, access control are essential issues be resolved. To settle these challenges, we...
Secure and efficient file storage sharing via authenticated physical devices remain challenging to achieve in a cyber-physical cloud environment, particularly due the diversity of used access services data. Thus this paper, we present lightweight identity-based data protocol provide secure among geographically dispersed clients. The proposed is demonstrated resist chosen-ciphertext attack (CCA) under hardness assumption decisional-Strong Diffie-Hellman (SDH) problem. We also evaluate...
With the advancement of Internet Things, LoRa Alliance produced Long-Range Wide-Area Network (LoRaWAN) Specification, allowing end-devices to transit through a gateway and join network after completing procedure. When an end-device joins LoRaWAN network, it must send request message server wait for verify such under current protocol. However, as number grows exponentially, verification messages will grow linearly with end-devices. This paper proposes authentication system multiple that...
Outsourcing Industrial Internet of Things (IIoT) data on the cloud extends diversity analysis for decision making with minimized costs in communications and storage. However, it is adverse to confidentiality IIoT from owner as access control performed by honest-but-curious platforms. Although encryption strategy guarantees security, hinders deliverance due its inbred all-or-nothing decryption. Certificateless supporting keyword search eliminates overhead certificates privileges retrieve...
Abstract With the rapid developments in embedded sensor technology, internet of things (IoT) becomes most focused research trend recent years. However, integration such technology into mobile crowdsensing networks results many security challenges. Data confidentiality and authenticity are two key privacy concerns any IoT‐based environment. Focusing on these issues, we present a new cryptographic protocol to meet those Our is based schemes; first an encryption scheme, which utilizes idea...
In the password based authenticated protocol, protecting off-line guessing attack is quite intricate owing to its low entropy property. order withstand it, three-factor (e.g., biometric, smartcard and password) authentication now becoming an important research paradigm in information security. Cheng et al.'s suggested key negotiation protocol using biometric Quadratic Residue Problem (QRP), they claim that it robust against known attacks. However, our careful observation demonstrates endures...
Abstract Identity‐based encryption (IBE) is one of the important public key techniques where not only identity receiver used for secure and efficient encryption, but it also has several merits over other traditional public‐key ones. However, two main disadvantages many such IBE‐based systems are requirement a large number parameters different random oracle operations, known that due to improper implementation vulnerable under chosen ciphertext attack. This paper designs an IBE scheme...
Signcryption is one of the recent public key paradigms that satisfies both requirement authenticity and confidentiality messages between parties. However, most all existing schemes use secure channel communication while distributing partial-private-keys to users in network. it not always efficient establish a during interaction entities. To address this issue, paper aims present new certificateless signcryption scheme does consider communication. The proposed designed without considering...
Signcryption is one of the most recent public key paradigms that fulfills both requirement confidentiality and authenticity messages between parties. It works more efficiently with a cost significantly smaller than required by signature-then-encryption technique. In this work, practically implementable ID-based sigcryption scheme using bilinear pairings presented. The proposed implemented under hardness CDH (Computational Diffie-Hellman) assumption in standard model without random oracle...
Recently, a number of authentication schemes have been designed for Internet Things (IoT). In 2017, Feng et al. proposed an scheme and claimed that their constructed is well secure. However, based on the cryptanalysis, it shown inappropriate its practical use as does not resist several attacks. Thus, vulnerable. To overcome these attacks, this paper aims to design light-weight which resists real-life security challenges. Besides, we compare our with other competitive find satisfactory results.
Recently, various certificate-less signature (CLS) schemes have been developed using bilinear pairing to provide authenticity of message. In 2015, Jia-Lun Tsai proposed a based short scheme elliptic curve cryptography (ECC) and prove its security under random oracle. However, it is shown that the inappropriate for practical use as there no message-signature dependency present during generation verification. Thus, vulnerable. To overcome these attacks, this paper aims variant Tsai's scheme....