ARPLR: An all-round and highly privacy-preserving location-based routing scheme for VANETs

Y Wang, X Li, X Zhang, X Liu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Location-based routing is a widely adopted message transmission mechanism in Vehicular
Ad Hoc Networks (VANETs). While the existing location-based routing schemes of VANETs …

An efficient key agreement and authentication protocol for secure communication in industrial IoT applications

R Vinoth, LJ Deborah - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
A most prominent and emerging technology namely the Internet of Things (IoT) enables
legitimate users to access and monitor the sensors installed in various units of the industry …

ANEL: A novel efficient and lightweight authentication scheme for vehicular ad hoc networks

Z Benyamina, K Benahmed, F Bounaama - Computer Networks, 2019 - Elsevier
Due to the large traffic congestion in modern-day, Vehicular Ad Hoc Network (VANET)
becomes an important approach to improve human safety and driving comfort. The large …

A provably secure sharding based blockchain smart contract centric hierarchical group key agreement for large wireless ad‐hoc networks

VS Naresh, VVLD Allavarpu, S Reddi… - Concurrency and …, 2022 - Wiley Online Library
Group key management with privacy preserving and trust still remains a precarious and
stimulating issue for securing multicast communications in an energy embarrassed large …

A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications

V Kumar, R Kumar, SK Pandey - International Journal of …, 2020 - Wiley Online Library
In today's Internet era, group communications have become more and more essential for
many emerging applications. Given the openness of today's networks, efficient and secure …

Weighted ternary tree approach for secure group communication among mobile applications

P Parthasarathi, S Shankar - Wireless Personal Communications, 2021 - Springer
Recent trends and clustered technology in the IT industries create usage of various hand-
held computing devices like mobile phones, digitizer, modem, tablets etc. The Mobile …

: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing

B Luo, X Li, X Liu, J Guo, Y Ren… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
When enjoying mobile crowdsensing (MCS), it is vital to evaluate the trustworthiness of
mobile users (MUs) without disclosing their sensitive information. However, the existing …

Group key distribution procedures for the L-band digital aeronautical communications system (LDACS)

T Ewert, N Mäurer, T Gräupl - 2021 IEEE/AIAA 40th Digital …, 2021 - ieeexplore.ieee.org
Since the beginning of the century, an increasing amount of air traffic has pushed current
aeronautical communication systems to their limits. Therefore, a modernization process is …

LKM-AMI: a lightweight key management scheme for secure two way communications between smart meters and HAN devices of AMI system in smart grid

V Kumar, R Kumar, SK Pandey - Peer-to-Peer Networking and …, 2021 - Springer
Smart Grid (SG) is a modernized power grid. Nowadays changing the power grid system into
a smart grid is revolution and evolution. Owing to the widespread use of wireless …

Efficient and Secure Group Key Management Scheme Based on Factorial Trees for Dynamic IoT Settings

K Sudheeradh, NN Jahnavi, PN Chine… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) extends Internet connectivity to resource-constrained devices
such as sensors and actuators. It is prone to several security threats and attacks, due to …