Keyword search (4,163 papers available)

"key exchange" Keyword-tagged Publications:

Title Authors PubMed ID
1 Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems Ahene E; Ofori-Oduro M; Twum F; Walker J; Missah YM; 34960339
ENCS

 

Title:Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems
Authors:Ahene EOfori-Oduro MTwum FWalker JMissah YM
Link:https://pubmed.ncbi.nlm.nih.gov/34960339/
DOI:10.3390/s21248245
Publication:Sensors (Basel, Switzerland)
Keywords:authentication protocolchaos-based cryptographykey exchangewireless power transfer
PMID:34960339 Category: Date Added:2021-12-28
Dept Affiliation: ENCS
1 Department of Computer Science, Kwame Nkrumah University of Science and Technology, PMB, UPO, KNUST, Kumasi, Ghana.
2 Department of Electrical and Computer Engineering, Concordia University, 1455 De Maisonneuve Blvd, Montreal, QC H3G IM8, Canada.
3 School of Software Engineering, University of Electronic Science and Technology of China, Chengdu 610051, China.

Description:

Chaos theory and its extension into cryptography has generated significant applications in industrial mixing, pulse width modulation and in electric compaction. Likewise, it has merited applications in authentication mechanisms for wireless power transfer systems. Wireless power transfer (WPT) via resonant inductive coupling mechanism enables the charging of electronic devices devoid of cords and wires. In practice, the key to certified charging requires the use of an authentication protocol between a transmitter (charger) and receiver (smartphone/some device). Via the protocol, a safe level and appropriate charging power can be harvested from a charger. Devoid of an efficient authentication protocol, a malicious charger may fry the circuit board of a receiver or cause a permanent damage to the device. In this regard, we first propose a chaos-based key exchange authentication protocol and analyze its robustness in terms of security and computational performance. Secondly, we theoretically demonstrate how the protocol can be applied to WPT systems for the purposes of charger to receiver authentication. Finally, we present insightful research problems that are relevant for future research in this paradigm.





BookR developed by Sriram Narayanan
for the Concordia University School of Health
Copyright © 2011-2026
Cookie settings
Concordia University