The basic architecture of identity-based digital signature (IDBDS).

The basic architecture of identity-based digital signature (IDBDS).

Source publication
Article
Full-text available
At the moment, digital documents are just as important as paper documents. As a result, authenticity is essential, especially in legal situations and digital forensics. As technology advances, these digital signature algorithms become weaker, necessitating the development of digital authentication schemes capable of withstanding current security th...

Citations

... Shankar et al. [11] developed a method dependent upon an asymmetric key cryptosystem and the client's biometric identifications. The Edwards-curve Digital Signature Algorithm (EdDSA), particularly Ed25519 was implemented to generate keys for document verification and signature. ...
Article
Full-text available
Secure storage model for digital forensics represents essential progress in the domain, addressing the major problems associated with protecting and maintaining digital evidence. This method employs recent encryption systems and optimal key generation methods to ensure the confidentiality and integrity of data throughout the investigative process. Cloud forensics is an intelligent development of digital forensics to be preserved against online hacking. But, centralized evidence gathered and preservation reduces the reliability of digital evidence. The architecture for digital forensics in an Infrastructure as a Service (IaaS) cloud platform is a crucial structure intended to simplify the collection and protection of evidence while preserving the integrity and origin of digital objects within cloud-based methods. This architecture integrates numerous modules and methods to address the exclusive tasks modeled by cloud computing (CC) environments in the framework of forensic investigations. This paper develops a new digital forensic architecture utilizing the Authentication with Optimal Key Generation Encryption (DFA-AOKGE) technique. The main intention of the DFA-AOKGE method is to use a BC-distributed design to allocate data between numerous peers for data collection and safe storage. Additionally, the DFA-AOKGE model uses the Secure Block Verification Mechanism (SBVM) for the authentication procedure. Also, the secret keys can be produced by the usage of the Enhanced Equilibrium Optimizer (EEO) model. Furthermore, the encryption of the data takes place using a multikey homomorphic encryption (MHE) approach and is then saved in the cloud server. The simulation value of the DFA-AOKGE methodology takes place in terms of different aspects. The simulation results exhibited that the DFA-AOKGE system shows prominent performance over other recent approaches in terms of different measures.
... The SCAR method computes risks, primarily in systems and security, taking into account tactics, management consulting, and equipment, programs, and components [24][25][26]. The danger potential risk thus provides SC surveillance systems. ...
Conference Paper
The term “Smart City” refers to incentives for the development that combines “Purely digital Connected City” and municipal government with the aid of ICT. By highlighting the intricacies of the future internet, this innovative idea provides in-depth information and serves as a link between the state, corporations, and the general population. Whenever it pertains to cyber security, issues like data confidentiality and SC potential vulnerabilities are discussed. In this research article, we examine the privacy issues surrounding the growth of the SC assets while also considering the opinions including both the commercial and technological activities into consideration. Additionally, we presented a Smart City Cyber Attack Framework (SCAR) technique. This approach not only creates encrypted information but also assesses the hazards. To establish an urban development, it is ensured that we take into account crucial elements like significant information gathering, storage capacity, restoration, experienced and highly network source high spending power SCAR. The SCAR structure that is proposed advises and maintains a multilayered representation of information storage, clarifies the numerous stakeholders in the communication process, and also guarantees service quality to target consumers. Our recommended approach also looks into cyber security measures put in place for smart urban. Additionally, we explore several facets of the dangers involved with cyberspace while highlighting the unique characteristics of SC-generated difficulties. Finally, the assessment of some important security measures for smart urban put forth by SCAR brings our investigation to a close.
Article
This research aims to develop robust, resilient, and user-friendly over-the-air (OTA) software update mechanisms for advanced driver assistance systems (ADAS) in modern vehicles. The study conducts a comprehensive review on existing OTA update approaches, identifies security threats and vulnerabilities, and proposes an algorithm that incorporates cryptographic techniques, secure authentication, firmware validation, and rollback protection. The methodology utilized in this study involves secure package generation, distribution, installation, and monitoring, as well as adhering to automotive cybersecurity standards, such as ISO/SAE 21434 and UNECE WP.29. Extensive evaluation of OTA systems is important as it helps to assess their resilience against adversarial attacks, ensures regulatory compliance, and optimizes usability through user studies. The results demonstrate successful execution of secure OTA update mechanisms, preventing risks, fostering reliability and safety of ADAS software updates. The case studies highlight real-world deployments, best practices, and the effectiveness of the developed solution in improving automotive cybersecurity and functional safety.