Smart City Gnosys

Smart city article details

Title Implementing Digital Signature With Rsa Algorithm To Enhance The Data Protection In Cloud
ID_Doc 30633
Authors Evangeline A.B.; Jegan R.; Nimi W.S.
Year 2023
Published 2023 1st International Conference on Advances in Electrical, Electronics and Computational Intelligence, ICAEECI 2023
DOI http://dx.doi.org/10.1109/ICAEECI58247.2023.10370917
Abstract India which is an agriculture dependent country must pave its way for promoting development of intelligent and smart agriculture system. The emergence of Internet of Things(IoT) technologies has changed various traditional applications to smart home, smart city, smart health, and smart agriculture. Even though Wireless Sensor Networks (WSNs) have seen rapid bloom, securing data in the network is still a challenge. The main objective of a smart agriculture system is to ensure the security of the data that is transmitted over the network and the one which is stored in cloud. A Wearable Environmental Monitoring System (WEMS) is designed with the aim of preventing loss of data and providing secure data communications. IoT data analytics with cryptographic algorithms will increase the protection of cloud data. In this paper, a combination of public key or asymmetric cipher algorithms namely Rivest, Shamir and Adleman (RSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) is proposed. © 2023 IEEE.
Author Keywords Asymmetric cipher; ECDSA; RSA; Wearable Environmental Monitoring System; Wireless Sensor Networks


Similar Articles


Id Similarity Authors Title Published
9105 View0.863David V.; Ragu H.; Nikhil V.; Sasikumar P.Analysis Of Algorithms For Effective Cryptography For Enhancement Of Iot SecurityLecture Notes in Networks and Systems, 396 (2023)
47636 View0.863Ametepe A.F.-X.; Ahouandjinou S.A.R.M.; Ezin E.C.Secure Encryption By Combining Asymmetric And Symmetric Cryptographic Method For Data Collection Wsn In Smart Agriculture5th IEEE International Smart Cities Conference, ISC2 2019 (2019)
47539 View0.854Frimpong E.; Michalas A.Secon-Ng: Implementing A Lightweight Cryptographic Library Based On Ecdh And Ecdsa For The Development Of Secure And Privacy-Preserving Protocols In Contiki-NgProceedings of the ACM Symposium on Applied Computing (2020)
7810 View0.853Shah T.A.; Ullah I.; Khan M.A.; Lorenz P.; Innab N.An Efficient Certificateless Forward-Secure Signature Scheme For Secure Deployments Of The Internet Of ThingsJournal of Sensor and Actuator Networks, 12, 1 (2023)