Transactions on Emerging Telecommunications Technologies最新文献

筛选
英文 中文
A systematic literature review on past attack analysis on industrial control systems 关于以往工业控制系统攻击分析的系统性文献综述
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-31 DOI: 10.1002/ett.5004
Swati Goel
{"title":"A systematic literature review on past attack analysis on industrial control systems","authors":"Swati Goel","doi":"10.1002/ett.5004","DOIUrl":"https://doi.org/10.1002/ett.5004","url":null,"abstract":"<p>Industrial control systems are used to automate the monitoring and control of physical processes in large-scale industries and critical infrastructure such as power plants, chemical treatment plants, manufacturing, and assembly line processes. Securing industrial control systems is important for the uninterrupted operation of these infrastructures, which are highly interconnected and becoming the prime target of attackers because disrupting these systems can have significant economic and safety implications and consequences such as power outages, environmental disasters, production shutdowns, or even physical harm. The past review works have discussed industrial control systems attacks, their impact, and exploited vulnerabilities separately and lack comprehension. In this work, an attempt has been made to understand the comprehensive picture of vulnerabilities, attacks, and their impact on industrial control systems. Past reviews published between 2014 and 2023 have been studied following a systematic literature review process, and a taxonomy and categorization of past attacks and defense mechanisms have been proposed and classified minutely for readers' interest. Vulnerabilities at the architecture, hardware, software, and communication network level have also been studied and presented. A deep understanding of past attacks, their impact, and identified potential causes is among the major contributions of this review. The results will enable researchers working in academics and industry to make effective decisions on safeguarding the industrial control systems against future attacks.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithms and throughput analysis of cognitive radio-based MIMO-NOMA for the next generation of wireless communications 下一代无线通信中基于认知无线电的 MIMO-NOMA 算法和吞吐量分析
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-23 DOI: 10.1002/ett.4988
Ahmed Abd Saeed, Mohamad A. Ahmed
{"title":"Algorithms and throughput analysis of cognitive radio-based MIMO-NOMA for the next generation of wireless communications","authors":"Ahmed Abd Saeed,&nbsp;Mohamad A. Ahmed","doi":"10.1002/ett.4988","DOIUrl":"https://doi.org/10.1002/ett.4988","url":null,"abstract":"<p>In this paper, multi-users (MU) communications are considered based on the cognitive ratio (CR) technique. Multiple-input multiple-output (MIMO) and non-orthogonal multiple access (NOMA) are proposed to be merged with CR for the sake of improving the achievable throughput and satisfying user fairness. Moreover, utilizing MIMO-NOMA enables the CR users to be served in the coverage network without the need for spectral sensing. Three scenarios are assumed in this paper to investigate the performance of each CR secondary user (SU) in the presence of single or multiple primary users (PUs). Pairing algorithms are proposed and applied to obtain optimum throughputs and outage probabilities, in which the algorithms are employed to select a PU with an SU to be coupled in a pair, depending on allocating the required power for each user, taking into account that any PU has the priority to reach its required throughput. Moreover, mathematical expressions have been derived for each case to evaluate the required power allocation factor and the achievable throughput for each user. Furthermore, the proposed algorithms show successful and satisfactory achievable rates and outage probabilities.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141085117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signal points allocation for generalized enhanced spatial modulation 广义增强空间调制的信号点分配
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-21 DOI: 10.1002/ett.4984
Ling Yin, Guang Zeng, Qingwen Long
{"title":"Signal points allocation for generalized enhanced spatial modulation","authors":"Ling Yin,&nbsp;Guang Zeng,&nbsp;Qingwen Long","doi":"10.1002/ett.4984","DOIUrl":"https://doi.org/10.1002/ett.4984","url":null,"abstract":"<p>In this paper, making full use of the spatial domain of transmit antennas (TAs) and keeping the characteristic of the squared minimum Euclidean distance (MED) between the transmitted spatial vectors (TSVs), generalized enhanced spatial modulation with signal points allocation (GESM-SPA) is proposed to expand the size of signal spaces for enhancing the spectral efficiency and the reliability of communications. In the GESM-SPA, according to the number of active TAs, signal constellation points (CPs) from the QAM or secondary QAM constellations are allocated and then modulated on the corresponding active TAs with the selected antenna index (AI) vector. Through this design, which further exploits the spatial domain with the variability of active TAs, the squared MED between the TSVs is increased in comparison with the existing traditional systems. More specifically, in view of the disadvantage of the classic ESM system, the constellation groups (CGs) with priority given to the QAM CPs are constructed to further maximize the squared MED. Then, the AI vector subsets corresponding to the obtained CGs are designed to be candidate for the specified AI vector set with the AI information. The squared MED and the average bit error probability (BEP) are analyzed. In simulation results using Monte Carlo, the GESM-SPA outperforms the existing classic systems in terms of the bit error rate performance.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141078914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review 自然启发算法在基于物联网的医疗保健服务中的应用:系统性文献综述
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-21 DOI: 10.1002/ett.4969
Zahra Amiri, Arash Heidari, Mohammad Zavvar, Nima Jafari Navimipour, Mansour Esmaeilpour
{"title":"The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review","authors":"Zahra Amiri,&nbsp;Arash Heidari,&nbsp;Mohammad Zavvar,&nbsp;Nima Jafari Navimipour,&nbsp;Mansour Esmaeilpour","doi":"10.1002/ett.4969","DOIUrl":"https://doi.org/10.1002/ett.4969","url":null,"abstract":"<p>Nature-inspired algorithms revolve around the intersection of nature-inspired algorithms and the IoT within the healthcare domain. This domain addresses the emerging trends and potential synergies between nature-inspired computational approaches and IoT technologies for advancing healthcare services. Our research aims to fill gaps in addressing algorithmic integration challenges, real-world implementation issues, and the efficacy of nature-inspired algorithms in IoT-based healthcare. We provide insights into the practical aspects and limitations of such applications through a systematic literature review. Specifically, we address the need for a comprehensive understanding of the applications of nature-inspired algorithms in IoT-based healthcare, identifying gaps such as the lack of standardized evaluation metrics and studies on integration challenges and security considerations. By bridging these gaps, our paper offers insights and directions for future research in this domain, exploring the diverse landscape of nature-inspired algorithms in healthcare. Our chosen methodology is a Systematic Literature Review (SLR) to investigate related papers rigorously. Categorizing these algorithms into groups such as genetic algorithms, particle swarm optimization, cuckoo algorithms, ant colony optimization, other approaches, and hybrid methods, we employ meticulous classification based on critical criteria. MATLAB emerges as the predominant programming language, constituting 37.9% of cases, showcasing a prevalent choice among researchers. Our evaluation emphasizes adaptability as the paramount parameter, accounting for 18.4% of considerations. By shedding light on attributes, limitations, and potential directions for future research and development, this review aims to contribute to a comprehensive understanding of nature-inspired algorithms in the dynamic landscape of IoT-based healthcare services.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141073767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the dissemination of privacy information in online social networks 在线社交网络中隐私信息传播的建模
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-21 DOI: 10.1002/ett.4989
Nafei Zhu, Wenhui Li, Shijia Pan, Shuting Jin, Jingsha He
{"title":"Modeling the dissemination of privacy information in online social networks","authors":"Nafei Zhu,&nbsp;Wenhui Li,&nbsp;Shijia Pan,&nbsp;Shuting Jin,&nbsp;Jingsha He","doi":"10.1002/ett.4989","DOIUrl":"https://doi.org/10.1002/ett.4989","url":null,"abstract":"<p>Driven by the rapid development of information technology, online social networks (OSNs) have experienced a fast development in recent years, allowing increasingly more people to share and spread information over OSNs. The rapid rise of OSN platforms such as Facebook and Twitter is sufficient evidence of such development. As one type of information, privacy information can also be created and disseminated over an OSN, posing a severe threat to individual privacy. This article attempts to construct a model for disseminating privacy information in OSNs and to analyze the model by simulating the dissemination process of privacy information in OSNs. First, we establish network models that exhibit the main characteristics of OSNs. Second, by considering the factors related to social relationships, especially intimacy between users and the attention of users to the privacy subject, we derive the parameters for privacy information dissemination models in OSNs. Third, based on the theory of information dissemination dynamics, we construct a model for information dissemination that conforms to the properties of privacy information. We also present some experimental results based on the constructed model and analyze the characteristics of privacy information dissemination. Fourth, we study and verify the various properties of the model through a set of experiments. The proposed model provides the opportunity to better understand the dynamics of privacy information dissemination in OSNs and the effect of user behavior on dissemination.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141073766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RCVM-ASS-CICSKA-PAPT-VDF: VLSI design of high-speed reconfigurable compressed Vedic PAPT-VDF filter for ECG medical application RCVM-AS-CICSKA-PAPT-VDF:用于心电图医疗应用的高速可重构压缩吠陀 PAPT-VDF 滤波器的 VLSI 设计
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-20 DOI: 10.1002/ett.4985
K. V. Suresh Kumar, D. Madhavi
{"title":"RCVM-ASS-CICSKA-PAPT-VDF: VLSI design of high-speed reconfigurable compressed Vedic PAPT-VDF filter for ECG medical application","authors":"K. V. Suresh Kumar,&nbsp;D. Madhavi","doi":"10.1002/ett.4985","DOIUrl":"https://doi.org/10.1002/ett.4985","url":null,"abstract":"<p>During signal acquisition, the signals are impacted by multiple noise sources that must be filtered before any analysis. However, many different filter implementations in VLSI are dispersed among many studies. This study aims to give readers a systematic approach to designing a Pipelined All-Pass Transformation based Variable digital filter (PAPT-VDF) to eliminate the high-frequency noise from ECG data. The modified design emphasizes first- and second-order responses to obtain high-speed filter realization with high operating frequencies. The addition of adder and multiplier designs to the hardware architecture of a filter design improves performance. The fundamental blocks of the filter design are the adder and multiplier. The adder and multiplier are employed with an Adaptable stage size-based concatenation, incremented carry-skip adder (ASS-CICSKA), and Improved reconfigurable compressed Vedic multiplier (IRCVM). Utilizing the adder design diminishes the delay with enhanced performance because receiving the carry from an incrementation block is not mandatory. In the multiplier design, the compressor and the reconfigurable approach are adapted with a data detector block to detect the redundant input and lower the logic gates' switching activity with less area overhead. The proposed filter design is implemented in vertex 7 FPGA family device, and the performance measures are analyzed regarding area utilization, delay, power, and frequency. Also, by using the denoised signal, the mean square error (MSE), and signal-to-noise ratio (SNR) are evaluated in the MATLAB platform.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141069096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain 基于中国余数定理和区块链的 Vanet 群组密钥协议
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-16 DOI: 10.1002/ett.4987
Haitao Xiao, An He
{"title":"A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain","authors":"Haitao Xiao,&nbsp;An He","doi":"10.1002/ett.4987","DOIUrl":"https://doi.org/10.1002/ett.4987","url":null,"abstract":"<p>Vehicular ad hoc Network (VANET) is a wireless self-organizing network for obtaining information about road conditions, vehicle speed, vehicle location and traffic congestion. Traditional key negotiation protocols create many problems when dealing with a group of vehicles that need to communicate over a public channel. For example, traditional key negotiation protocols rely too much on the participation of trusted institutions and suffer from a single point of failure. Meanwhile, group session key negotiation is usually inefficient with high computational cost and communication overhead. To solve these problems, this paper proposes a blockchain-based Chinese Remainder Theorem (CRT) VANET group key agreement. In addition, the protocol supports dynamic management of vehicles, including joining and exit. Formal security proofs show that our solution satisfies basic security requirements. Experiments using ProVerif show that the protocol functions properly even under many active and passive attacks, such as eavesdropping attacks. Performance analysis shows that the protocol is more efficient in the face of multi-vehicle communication, in particular by reducing the computational cost by up to 75% and the communication overhead by up to 66%.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140949138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A generalized detection framework for covert timing channels based on perceptual hashing 基于感知散列的隐蔽定时信道通用检测框架
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-09 DOI: 10.1002/ett.4978
Xiaolong Zhuang, Yonghong Chen, Hui Tian
{"title":"A generalized detection framework for covert timing channels based on perceptual hashing","authors":"Xiaolong Zhuang,&nbsp;Yonghong Chen,&nbsp;Hui Tian","doi":"10.1002/ett.4978","DOIUrl":"https://doi.org/10.1002/ett.4978","url":null,"abstract":"<p>Network covert channels use network resources to transmit data covertly, and their existence will seriously threaten network security. Therefore, an effective method is needed to prevent and detect them. Current network covert timing channel detection methods often incorporate machine learning methods in order to achieve generalized detection, but they consume a large amount of computational resources. In this paper, we propose a generalized detection framework for covert channels based on perceptual hashing without relying on machine learning methods. And we propose a one-dimensional data feature descriptor for feature extraction of perceptual hash for the data characteristics of covert timing channels. We first generate the hash sequence of the corresponding channel to get the average hash, which is used for comparison in the test phase. The experimental results show that the feature descriptor can capture the feature differences of one-dimensional data well. When compared to machine learning methods, this perceptual hashing algorithms enable faster traffic detection. Meanwhile, our method is able to detect the effectiveness with the smallest coverage window compared with the latest solutions. Moreover, it exhibits robustness in jitter network environment.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140895247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions-based Internet of Things Mobile Edge Computing 基于虚拟化网络功能的物联网移动边缘计算中撤销未经授权访问的基于强化学习的区块链模型
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-07 DOI: 10.1002/ett.4981
C. T. Kalaivani, R. Renugadevi, Jeffin Gracewell, A. Arul Edwin Raj
{"title":"Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions-based Internet of Things Mobile Edge Computing","authors":"C. T. Kalaivani,&nbsp;R. Renugadevi,&nbsp;Jeffin Gracewell,&nbsp;A. Arul Edwin Raj","doi":"10.1002/ett.4981","DOIUrl":"https://doi.org/10.1002/ett.4981","url":null,"abstract":"<p>VNFs boost data processing efficiency in Mobile Edge Computing (MEC)-driven Internet of Things (IoT) for healthcare, smart cities, and industrial automation. VNF-based IoT MEC systems encounter a significant security threat due to unauthorized access, posing risks to data privacy and system integrity. Existing approaches struggle to adapt to dynamic environments and lack tamper-proof enforcement mechanisms. In this work, we propose a novel system combining Reinforcement Learning (RL) and blockchain technology to revoke unauthorized access in VNF-based IoT MEC. We introduce the Integrated Action-selection DRL Algorithm for Unauthorized Access Revocation (IASDRL-UAR), a novel RL approach that excels in dynamic environments by handling both continuous and discrete actions, enabling real-time optimization of security risk, execution time, and energy consumption. A behavior control contract (BCC) is proposed and integrated into the RL system, automating behavior checks and enforcement, streamlining security management, and reducing manual intervention. RL feedback plays a pivotal role in steering dynamic security adjustments, gaining valuable perspectives from user behavior via trust scores in the behavior contract. The security features of the proposed method are analyzed. Performance comparisons reveal a substantial improvement, with the proposed system outperforming existing methods by 30% in terms of throughput, 21.7% in system stability, and 26% in access revocation latency. Additionally, the system demonstrates a higher security index, energy efficiency, and scalability.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced authentication and device integrity protection for GDOI using blockchain 利用区块链为 GDOI 提供增强型身份验证和设备完整性保护
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-06 DOI: 10.1002/ett.4986
Munkenyi Mukhandi, Eduardo Andrade, Jorge Granjal, João P. Vilela
{"title":"Enhanced authentication and device integrity protection for GDOI using blockchain","authors":"Munkenyi Mukhandi,&nbsp;Eduardo Andrade,&nbsp;Jorge Granjal,&nbsp;João P. Vilela","doi":"10.1002/ett.4986","DOIUrl":"https://doi.org/10.1002/ett.4986","url":null,"abstract":"<p>Recent device-level cyber-attacks have targeted IoT critical applications in power distribution systems integrated with the Internet communications infrastructure. These systems utilize group domain of interpretation (GDOI) as designated by International Electrotechnical Commission (IEC) power utility standards IEC 61850 and IEC 62351. However, GDOI cannot protect against novel threats, such as IoT device-level attacks that can modify device firmware and configuration files to create command and control malicious communication. As a consequence, the attacks can compromise substations with potentially catastrophic consequences. With this in mind, this article proposes a permissioned/private blockchain-based authentication framework that provides a solution to current security threats such as the IoT device-level attacks. Our work improves the GDOI protocol applied in critical IoT applications by achieving decentralized and distributed device authentication. The security of our proposal is demonstrated against known attacks as well as through formal mechanisms via the joint use of the AVISPA and SPAN tools. The proposed approach adds negligible authentication latency, thus ensuring appropriate scalability as the number of nodes increases.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.4986","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140844955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信