Figure 1 - uploaded by Alžbeta Kanalikova
Content may be subject to copyright.
General security hierarchy of a PKI system according to C2C CC [7] 

General security hierarchy of a PKI system according to C2C CC [7] 

Source publication
Conference Paper
Full-text available
In the paper the authors focus on models construction of transport scenarios with orientation to security analysis of C2C communications. In the practical part two transport scenarios are analysed on a sample of real captured transport data via Riverbed Modeler tool. The computational complexity of ECDSA digital signature schemes was determined acc...

Similar publications

Article
Full-text available
Deployment of battery energy storage (BES) in active distribution networks (ADNs) can provide many benefits in terms of energy management and voltage regulation. In this study, a stochastic optimal BES planning method considering conservation voltage reduction (CVR) is proposed for ADN with high-level renewable energy resources. The proposed method...

Citations

... The development of information systems infrastructure is critical for improving government work, but the main issue is security threats and concerns. These are service and infrastructure concerns, as the loss of government data, as well as violations of citizens' privacy and confidentiality, is a major challenge for government institutions [1], [2]. The primary goal of the research is to develop and implement a model for providing and evaluating information security in organizations. ...
Article
Full-text available
Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of this feature in the application of access and control methods in terms of security. Based on this, we propose a model for improving security for all departments of government institutions by addressing security issues early in the system's life cycle, integrating them with functional elements throughout the life cycle, and focusing on the system's organizational aspects. The main security aspects covered are system administration, organizational factors, enterprise policy, and awareness and cultural aspects.
... Validation of domain parameters is important to ensure strong security against different attacks. This algorithm becomes strong if the parameters are well validated [20,21]. The authors' recommendations are to update the validation scheme. ...
... Security requirements are significantly important, in particular, the authentication and integrity requirement, to prevent many attacks such as man-in-the-middle (MITM) and replay [98]. According to many research projects in [83,99,100,20,101], ECDSA's signatures is a security solution to prevent many attacks such as modification, spoofing, denial, and cyber. Figure 2 shows the classification of non-physical attacks. ...
... This scheme provides integrity, authentication, and non-repudiation, as it is convenient for constrained-source networks. Also, Franeková et al. [20] have provided a security analysis of the ECDSA algorithm (key lengths of 160,192,224,256,384 and 521) with VANET (V2V) applications. They applied many curves to the ECDSA (OpenSSL library) such as prime, pseudorandom binary, Koblitz binary. ...
Article
Full-text available
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC)and elliptic curve digital signature algorithm (ECDSA) have been attracting attention frommany researchers in different institutions because these algorithms provide security andhigh performance when being used in many areas such as electronic-healthcare, electronicbanking,electronic-commerce, electronic-vehicular, and electronic-governance. These algorithmsheighten security against various attacks and the same time improve performanceto obtain efficiencies (time, memory, reduced computation complexity, and energy saving)in an environment of constrained source and large systems. This paper presents detailedand a comprehensive survey of an update of the ECDSA algorithm in terms of performance,security, and applications.
... ECDSA becomes inappropriate to sign d if applied poorly and incorrectly. It becomes reliable if the parameters are validated effectively [46]. In REISCH, we use ECDSA-256 bit to add a high-security level and take care to consume system resources. ...
Article
Full-text available
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24\% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks.
... Validation of domain parameters is important to ensure strong security against different attacks. This algorithm becomes strong if the parameters are well validated [20,21]. The authors' recommendations are to update the validation scheme. ...
... Security requirements are significantly important, in particular, the authentication and integrity requirement, to prevent many attacks such as man-in-the-middle (MITM) and replay [98]. According to many research projects in [83,99,100,20,101], ECDSA's signatures is a security solution to prevent many attacks such as modification, spoofing, denial, and cyber. Figure 2 shows the classification of non-physical attacks. ...
... This scheme provides integrity, authentication, and non-repudiation, as it is convenient for constrained-source networks. Also, Franeková et al. [20] have provided a security analysis of the ECDSA algorithm (key lengths of 160,192,224,256, 384 and 521) with VANET (V2V) applications. They applied many curves to the ECDSA (OpenSSL library) such as prime, pseudorandom binary, Koblitz binary. ...
Preprint
Full-text available
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different institutions because these algorithms provide security and high performance when being used in many areas such as electronic-healthcare, electronic-banking, electronic-commerce, electronic-vehicular, and electronic-governance. These algorithms heighten security against various attacks and at the same time improve performance to obtain efficiencies (time, memory, reduced computation complexity, and energy saving) in an environment of the constrained source and large systems. This paper presents detailed and a comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications.
... Validation of domain parameters is important to ensure strong security against different attacks. This algorithm becomes strong if the parameters are well validated [20,21]. The authors' recommendations are to update the validation scheme. ...
... Security requirements are significantly important, in particular, the authentication and integrity requirement, to prevent many attacks such as man-in-the-middle (MITM) and replay [98]. According to many research projects in [83,99,100,20,101], ECDSA's signatures is a security solution to prevent many attacks such as modification, spoofing, denial, and cyber. Figure 2 shows the classification of non-physical attacks. ...
... This scheme provides integrity, authentication, and non-repudiation, as it is convenient for constrained-source networks. Also, Franeková et al. [20] have provided a security analysis of the ECDSA algorithm (key lengths of 160,192,224,256,384 and 521) with VANET (V2V) applications. They applied many curves to the ECDSA (OpenSSL library) such as prime, pseudorandom binary, Koblitz binary. ...
Article
Full-text available
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different institutions because these algorithms provide security and high performance when being used in many areas such as electronic-healthcare, electronic-banking, electronic-commerce, electronic-vehicular, and electronic-governance. These algorithms heighten security against various attacks and the same time improve performance to obtain efficiencies (time, memory, reduced computation complexity, and energy saving) in an environment of constrained source and large systems. This paper presents detailed and a comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications.