8
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Communication security of intelligent information service platform combining AES and ECC algorithms

ORCID Icon, , , &
Received 12 Mar 2024, Accepted 18 Jun 2024, Published online: 28 Jun 2024

References

  • Nanda A, Puthal D, Rodrigues JJ, et al. Internet of autonomous vehicles communications security: overview, issues, and directions. IEEE Wireless Commun. 2019;26(4):60–65. doi: 10.1109/MWC.2019.1800503
  • Hafsa A, Sghaier A, Zeghid M, et al. An improved co-designed AES-ECC cryptosystem for secure data transmission. Int J Inf Comp Secur. 2020;13(1):118–140. doi: 10.1504/IJICS.2020.108145
  • Massaro A, Leogrande A, Lisco P, et al. Innovative Bi approaches and methodologies implementing a multilevel analytics platform based on data mining and analytical models: a case of study in roadside assistance services. Int J Soft Comput Artif Intel Appl. 2019;8(1):17–36. doi: 10.5121/ijscai.2019.8102
  • He Y, Kong M, Du C, et al. Communication security analysis of intelligent transportation system using 5G internet of things from the perspective of big data. IEEE Trans Intell Trans Syst. 2022;24(2):1–9. doi: 10.1109/TITS.2022.3141788
  • Liu J, Zhang L, Li C, et al. Blockchain-based secure communication of intelligent transportation digital twins’ system. IEEE Trans Intell Transp Syst. 2022;23(11):22630–22640. doi: 10.1109/TITS.2022.3183379
  • Mukhopadhyay N, De TK, Chatterjee D. A novel virtualization enabled cloud infrastructural framework for enhancing private cloud communication security. Int J Inf Secur Sci. 2021;10(1):16–25.
  • Senthilkumar R, Geetha BG. Asymmetric key blum-goldwasser cryptography for cloud services communication security. J Internet Technol. 2020;21(4):929–939.
  • Zhang X. End-to-end encrypted communication security technology for mobile terminals. Int J Auton Adapt Commun Syst. 2021;14(1/2):179–195. doi: 10.1504/IJAACS.2021.114290
  • Kong PY. A review of quantum key distribution protocols in the perspective of smart grid communication security. IEEE Syst J. 2020;16(1):41–54. doi: 10.1109/JSYST.2020.3024956
  • Du H, Wang J, Niyato D, et al. Rethinking wireless communication security in semantic internet of things. IEEE Wireless Commun. 2023;30(3):36–43. doi: 10.1109/MWC.011.2200547
  • Guo J, Liu Y, Li S, et al. Game-oriented security strategy against hotspot attacks for internet of vehicles. Comput Mater Continua. 2021;68(2):2145–2157. doi: 10.32604/cmc.2021.016411
  • Yan J, Zhang Y, Lu Y, et al. Optical communication security transmission based on blockchain. Optoelectron Lett. 2022;18(4):0227–0232. doi: 10.1007/s11801-022-1119-5
  • Lu H, Jin C, Helu X, et al. DeepAutoD: research on distributed machine learning oriented scalable mobile communication security unpacking system. IEEE Trans Netw Sci Eng. 2021;9(4):2052–2065. doi: 10.1109/TNSE.2021.3100750
  • Xu Z, Lu J, Wang X, et al. AI and machine learning for the analysis of data flow characteristics in industrial network communication security. Int J Ad Hoc Ubiquitous Comput. 2021;37(3):125–136.
  • Vijay GR, Reddy ARM. An extended infrastructure security scheme for multi-cloud systems with verifiable inter-server communication protocol. Int J Comput Aided Eng Technol. 2021;14(2):168–188. doi: 10.1504/IJCAET.2021.113544
  • Dhasarathan C, Shanmugam M, Kumar M, et al. A nomadic multi-agent based privacy metrics for e-health care: a deep learning approach. Multimedia Tools Appl. 2024;83(3):7249–7272. doi: 10.1007/s11042-023-15363-4
  • Salem RB, Aimeur E, Hage H. A multi-party agent for privacy preference elicitation. Artif Intell And Applications. 2023;1(2):98–105. doi: 10.47852/bonviewAIA2202514
  • Jagadeesh S, Ali SM, Selvan SPG, et al. Hybrid AES-Modified ECC algorithm for improved data security over cloud storage. J Adv Res Appl Sci Eng Technol. 2023;32(1):46–56. doi: 10.37934/araset.32.1.4656
  • Bommala H, Kiran S, Pujitha M, et al. Performance of evaluation for AES with ECC in cloud environment. Int J Adv Networking Appl. 2019;10(5):4019–4025. doi: 10.35444/IJANA.2019.10056
  • Gurav YB, Patil BM. De-centralized information flow control for cloud virtual machines with hybrid AES-ECC and improved meta-heuristic optimization based optimal key generation. Int J Intell Robot Appl. 2023;7(2):406–425. doi: 10.1007/s41315-022-00268-6
  • Goyal TK, Sahula V, Kumawat D. Energy efficient lightweight cryptography algorithms for IoT devices. IETE J Res. 2022;68(3):1722–1735. doi: 10.1080/03772063.2019.1670103
  • Aladdin A, Muhammed R, Aziz R, et al. Comparative analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for image encryption. Kurdistan J Appl Res. 2024;9(1):52–65. doi: 10.24017/science.2024.1.5
  • Baladhay JS, Gamido HV, Edjie M. Large file encryption in a reduced-round permutation-based AES file management system. Indones J Electr Eng Comput Sci. 2024;34(3):2021–2031. doi: 10.11591/ijeecs.v34.i3.pp2021-2031

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.