[HTML][HTML] ISG-SLAS: Secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor

SJ Yu, KS Park - Journal of Systems Architecture, 2022 - Elsevier
Smart grid (SG) has been received significant attention due to various services such as
renewable energy and demand response. However, SG is fragile to various security attacks …

Comparison of innovative signature algorithms for WSNs

B Driessen, A Poschmann, C Paar - … of the first ACM conference on …, 2008 - dl.acm.org
For many foreseen applications of Wireless Sensor Networks (WSN)-for example monitoring
the structural health of a bridge-message integrity is a crucial requirement. Usually, security …

Study and design of blockchain based decentralized trust management system for secure transactions

V Deshpande - 2020 - theses.hal.science
In the context of modern connected world, the concept of atomic data transfer/transaction
has been completely redefined. Traditional distributed databases solve the issue of data …

Blockchain-based community safety security system with IoT secure devices

CL Chen, ZY Lim, HC Liao - Sustainability, 2021 - mdpi.com
Humans frequently need to construct a huge number of buildings for occupants in large
cities to work or live in a highly developed civilization; people who live in the same building …

Research on Oracle Technology Based on Multi-Threshold Aggregate Signature Algorithm and Enhanced Trustworthy Oracle Reputation Mechanism

Z Wang, M Gao, G Lu - Sensors, 2024 - mdpi.com
In the realm of IoT sensor data security, particularly in areas like agricultural product
traceability, the challenges of ensuring product origin and quality are paramount. This …

A Smart-Dustbin and Integration of Waste Management System using IoT

G Rupesh, MS Advytha, NB Prakash… - 2022 4th …, 2022 - ieeexplore.ieee.org
By monitoring and controlling city activities in actual time, the paradigm's Internet of Things
(IoT) has a critical role in application development for smart cities. Sold waste administration …

Opportunities and challenges in securing critical infrastructures through cryptography

Z Yang, S Adepu, J Zhou - IEEE Security & Privacy, 2021 - ieeexplore.ieee.org
Opportunities and Challenges in Securing Critical Infrastructures Through Cryptography Page
1 1540-7993/21©2021IEEE Copublished by the IEEE Computer and Reliability Societies …

Sustainable Waste Management using Block Chain Techniques for Smart City

R Chithra, P Kishorekumar… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Environmental sustainability is a paramount concern in the management of waste which
requires a unique innovative solution. The global waste and resource crises necessitate and …

A secure and portable multi-sensor module for distributed air pollution monitoring

G Kolumban-Antal, V Lasak, R Bogdan, B Groza - Sensors, 2020 - mdpi.com
Air quality in urban environments has become a central issue of our present society as it
affects the health and lives of the population all over the world. The first step in mitigating …

Identity Management Using Blockchain in IoT Applications

P Tripathi, A Pradhan - The Convergence of Artificial Intelligence …, 2022 - World Scientific
To evaluate the efficiency of any system, a smart work monitoring system is required to
ensure the accountability and reliability of each user in the process. The ever-growing pool …