A Methodology for Elliptic Curve Cryptography-Based Digital Signature Scheme: A System with Enhanced Security
Keywords:
Elliptic Curve Cryptography, Digital Signature Scheme, Encryption, Hypertext Transfer Protocol, Secured Socket Layer.Abstract
To increment rural efficiency, accuracy horticulture incorporates robotization and the utilization of an assortment of IT devices. Here, shrewd contraptions accumulate an immense measure of information and speak with servers and different gadgets over open channels. Subsequently, a few attacks against shrewd cultivating are conceivable. These assaults can have unfavorable impacts since detected information is commonly handled to help assess the condition of horticultural fields and to support navigation. Regardless of the way that few security procedures have been proposed in the writing to resolve these issues, they are either ineffectual or powerless against interruptions. Understanding Diffie-Hellman key trade and utilizing elliptic bend highlights are the most important phases in the task. It finishes up with significant data about Elliptic Bend Cryptography, remembering its viability and productivity for little gadgets, more limited key length, transfer speed reserve funds, simplicity of key age during information encryption and decoding, and surefire quicker encryption and unscrambling.
Downloads
References
S. Komolov, Sh. Rakhmatov Fundamentals of Artificial Intelligence. Machine learning. Izhod NAShR Publishing House. p.104. Tashkent, Uzbekistan (2022)
V. Obuxov, Universum: technical sciences, (11-6 (116)), 55-56 (2023)
V.S. Miller, Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417-426). Berlin, Heidelberg: Springer Berlin Heidelberg (1985)
N. I. Koblitz, Moscow Mathematical Journal, 2(4), 693-715 (2002)
R. Afreen, S.C. Mehrotra, A review on elliptic curve cryptography for embedded systems. arXiv preprint arXiv:1107.3631. (2011).
O.N. Zhdanov, V. A. Chalkin, Elliptic Curves: Foundations of Theory and Cryptographic Applications. Moscow: LIBROCOM Book House, (2013).
T. Dostonbek, M. Jamshid, Central Asian Journal of Theoretical and Applied Science, 4(4), 93-98 (2023).
Z. Abdulkhaev, et.al.,AIP Conference Proceedings 2789, 1 (2023)
M. Madaliev, N. Qurbanova, X. Rustamova, Journal of Construction and Engineering Technology 1(1), 1-6 (2023)
Z.E. Abdulkhaev, et.al., E3S Web of Conferences 420, 07023 (2023).
Vangala, A.; Das, A.K.; Mitra, A.; Das, S.K.; Park, Y. Blockchain-Enabled Authenticated Key Agreement Scheme for Mobile Vehicles-Assisted Precision Agricultural IoT Networks. IEEE Trans. Inf. Forensics Secur. 2022, 18, 904–919.
Shafi, U.; Mumtaz, R.; García-Nieto, J.; Hassan, S.A.; Zaidi, S.A.R.; Iqbal, N. Precision Agriculture Techniques and Practices: From Considerations to Applications. Sensors 2019, 19, 3796.
Shi, X.; An, X.; Zhao, Q.; Liu, H.; Xia, L.; Sun, X.; Guo, Y. State-of-the-Art Internet of Things in Protected Agriculture. Sensors 2019, 19, 1833.
Vangala, A.; Das, A.K.; Chamola, V.; Korotaev, V.; Rodrigues, J.J. Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges. Cluster Comput. 2022, 26, 879–902.
Bera, B.; Vangala, A.; Das, A.K.; Lorenz, P.; Khan, M.K. Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment. Comput. Stand. Interfaces 2022.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.