Elliptic Curve Cryptography-Based Scheme for Secure Signaling and Data Exchanges in Precision Agriculture
نویسندگان
چکیده
Precision agriculture encompasses automation and application of a wide range information technology devices to improve farm output. In this environment, smart collect exchange massive number messages with other servers over public channels. Consequently, farming is exposed diverse attacks, which can have serious consequences since the sensed data are normally processed help determine agricultural field status facilitate decision-making. Although myriad security schemes has been presented in literature curb these challenges, they either poor performance or susceptible attacks. paper, an elliptic curve cryptography-based scheme presented, shown be formally secure under Burrows–Abadi–Needham (BAN) logic. addition, it semantically demonstrated offer user privacy, anonymity, unlinkability, untraceability, robust authentication, session key agreement, secrecy does not require deployment verifier tables. withstand side-channeling, physical capture, eavesdropping, password guessing, spoofing, forgery, replay, hijacking, impersonation, de-synchronization, man-in-the-middle, privileged insider, denial service, stolen device, known session-specific temporary terms performance, proposed protocol results 14.67% 18% reductions computation communication costs, respectively, 35.29% improvement supported features.
منابع مشابه
A Signcryption Scheme based on Elliptic Curve Cryptography
In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and encryption mechanisms can be combined to form a single logic...
متن کاملBlind Signature Scheme Based on Elliptic Curve Cryptography
Blind signatures are important techniques and are widely used in many e-commerce services, such as electronic voting and electronic cash system. In this article, we present a blind signature scheme based on elliptic curves cryptography and prove that it satisfies the requirements of blindness, unforgeability and untraceability.
متن کاملA Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
In this article, the authors shall propose a new method for the implementation of secure Bluetooth piconets. Two requirements for the systems must be considered, i.e., privacy and authentication. Privacy ensures that an eavesdropper cannot intercept conversations between two slaves in piconets. Authentication ensures that service is not obtained fraudulently in order to avoid charge for usage. ...
متن کاملRSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs
A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in these networks is challenging. Threshold Cryptography (TC) provides a promise of securing these networks. In this paper, we discuss our RSA-based Threshold Cryptography (RSA-TC) and...
متن کاملSpeeding up Secure Web Transactions Using Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) is emerging as an attractive alternative to traditional public-key cryptosystems (RSA, DSA, DH). ECC offers equivalent security with smaller key sizes resulting in faster computations, lower power consumption, as well as memory and bandwidth savings. While these characteristics make ECC especially appealing for mobile devices, they can also alleviate the comput...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sustainability
سال: 2023
ISSN: ['2071-1050']
DOI: https://doi.org/10.3390/su151310264