Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3215688
Abstract: In Internet of Things (IoT), cryptography-based security services are widely used to mitigate security threats. However, establishing cryptographic keys between entities in dynamic IoTs is a challenging issue, due to the high mobility of these…
read more here.
Keywords:
authenticated key;
key establishment;
based authenticated;
trajectory based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Smart Grid"
DOI: 10.1109/tsg.2021.3102156
Abstract: In this paper, we introduce a robust authentication protocol for Vehicle-to-Grid (V2G) communication through lightweight and secure cryptographic primitives. In addition, we utilize signcrypt and unsigncrypt functions which facilitate the consumers to have secure access…
read more here.
Keywords:
signcryption based;
based authenticated;
exchange protocol;
protocol ... See more keywords