[HTML][HTML] Classification and comparison of ad hoc networks: A review

R Agrawal, N Faujdar, CAT Romero, O Sharma… - Egyptian Informatics …, 2023 - Elsevier
The study of ad hoc networks and their different varieties, including wireless sensor
networks, wireless mesh networks, and mobile ad hoc networks, is discussed in this paper …

Security in the internet of things application layer: requirements, threats, and solutions

M Abbasi, M Plaza-Hernández, J Prieto… - IEEE …, 2022 - ieeexplore.ieee.org
Communication systems and networks are evolving as an integral part of not only of our
everyday life but also as a part of the industry, fundamental infrastructures, companies, etc …

A certificateless aggregate signature scheme for security and privacy protection in VANET

EF Cahyadi, TW Su, CC Yang… - International Journal of …, 2022 - journals.sagepub.com
In the vehicular ad hoc network, moving vehicles can keep communicating with each other
by entering or leaving the network at any time to establish a new connection. However, since …

A self-sustainable opportunistic solution for emergency detection in ageing people living in rural areas

M Jesus-Azabal, J Berrocal, VNGJ Soares… - Wireless …, 2023 - Springer
There are contexts where communication with TCP/IP protocol is not possible due to the lack
of infrastructure or a reliable and continuous data transmission. In this cases, alternatives …

A lightweight BT-based authentication scheme for illegal signatures identification in VANETs

EF Cahyadi, MS Hwang - IEEE Access, 2022 - ieeexplore.ieee.org
Research related to vehicular ad hoc networks (VANETs) has received significant attention
in recent years. Despite all the advantages, the security and privacy in VANETs still become …

A Lightweight Certificateless Mutual Authentication Scheme Based On Signatures for the IIoT

D Yin, B Gong - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT), through the extensive deployment of devices for
sensing, transmitting, and analyzing production states, can provide users with more …

A Gap Analysis of the Adoption Maturity of Certificateless Cryptography in Cooperative Intelligent Transportation Systems

H Salin, M Lundgren - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Cooperative Intelligent Transport Systems (C-ITSs) are an important development for
society. C-ITSs enhance road safety, improve traffic efficiency, and promote sustainable …

Security, Privacy, and Trust Issues in Intelligent Transportation System

AK Tyagi, N Sreenath - Intelligent Transportation Systems: Theory and …, 2022 - Springer
Introduction to security, privacy, and trust in intelligent transportation systems (ITS), security,
privacy, trust requirements in intelligent transportation systems, and cryptographic …

高效可证明安全的无证书有序聚合签名方案

王竹, 杨思琦, 李凤华, 耿魁, 彭婷婷, 史梦瑶 - 通信学报, 2022 - infocomm-journal.com
针对目前的方案多采用后一个签名者对前一个签名者的签名进行验证后, 再将签名传递给下一个
签名者, 导致整体签名时间过长的效率问题, 基于双线性对构造了一种无证书有序聚合签名方案 …

Design of improved PBFT algorithm based on aggregate signature and node reputation

J Fu, W Zhou, J Xu - Intelligent and Converged Networks, 2023 - ieeexplore.ieee.org
The alliance chain system is a distributed ledger system based on blockchain technology,
which can realize data sharing and collaboration among multiple parties while ensuring …