|
Authors: Makkar, A; Kumar, N |
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF
ESCIENCE |
Volume: 90 Pages: 381-404 Published: JAN
2019 Language: English Document
type: Article |
Abstract: From the past few years, there is an exponential increase in one of
the most popular technologies of the modern era called as Internet of Things
(IoT). In IoT, various
objects perform the tasks of sensing, communication, and computation for
providing uninterrupted services (e.g., e-health, e-transportation, security
access, etc.) to the end users. In this era, Cognitive Internet of Things (CIoT) is an another paradigm of IoT
developed to enhance the capabilities of intelligence in IoT
objects where these objects can take independent decisions in any
environment. IoT follows the service oriented
architecture (SOA), in which the application layer is the topmost layer. It
enables the IoT objects to interact with the other
objects located across the globe. The power of learning, thinking, and
understanding by these objects, can make the information access more accurate
and reliable but Web spam is one of the challenges while accessing
information from the web. It has been observed from the literature review
that search engines are preferred mostly by the people for accessing
information. The efficient ranking by the search engines can reduce the
computational cost of information exchange by IoT
objects. Search engines should be able to prevent the spam from being
injected into the web. But, the existing techniques for this problem target
in finding the spam after its occurrence in search engine result pages. So,
in this proposal, we present an intelligent cognitive spammer framework,
Cognitive spammer, which eliminates the spam pages during the web page rank
score calculation by search engines. The framework up-date the Google's
ranking algorithm, PageRank in such a way that it automatically prevents link
spam by considering the link structure of web for rank score computation. The
updated PageRank algorithm provided the better ranking of web pages. The
proposed framework is validated with the WEBSPAM-UK2007 dataset. Before
processing, the dataset is preprocessed with a new
technique, called as 'Split by Over-sampling and Train by Under-fitting' to
remove the trade off between imbalanced instances
of target class. After data cleaning, we applied machine learning techniques
(Bagged model, Boosted linear model, etc) with the web page features to make accurate
predictions. The detection classifiers only consider the link features of the
web page irrespective of the page content. Out of the fifteen classifiers,
best three are ensemble, which results in better performance with overall
accuracy improvement. Ten-fold cross validation has also been applied with
the resulted ensemble model, which results in getting the accuracy of 99.6%
in the proposed scheme. (C) 2018 Published by Elsevier B.V. |
|
|
Record 2 of 19 |
|
Authors: Kaur, N; Tiwari, SD |
JOURNAL OF PHYSICS AND CHEMISTRY OF SOLIDS |
Volume: 123 Pages: 279-283 Published: DEC
2018 Language: English Document
type: Article |
Abstract: Magnetization measurements on antiferromagnetic iron storage protein
ferritin are reported. The magnetization as a function of applied magnetic
field data in superparamagnetic region are analyzed
considering a distribution in particle size. The estimated particle size
distribution is compared with that determined from transmission electron
micrograph. Effect of magnetic anisotropy on magnetization process of this
nanoparticle system is also discussed. |
|
|
Record 3 of 19 |
Buoyancy-driven convective heat
transfer from a semi-circular cylinder for various confinements |
Authors: Gupta, RK; Chandra, A; Gupta, RK |
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES |
Volume: 43 Issue: 11 Published: NOV
2018 Language: English Document
type: Article |
Abstract: Buoyancy-driven convective heat transfer from a semi-circular cylinder
for various confinements has been studied using numerical simulations for
wide ranges of parameters, Reynolds numbers (1Re50), Richardson numbers
(0Ri2), Prandtl numbers (0.7Pr50) and confinement
ratios (0.20.8). A hot semi-circular cylinder is symmetrically kept in a 2D
rectangular confinement. The circular side of the cylinder faces the upstream
flow and the fluid flows against gravity in the channel. The governing
equations are numerically solved using FLUENT and the results obtained are
presented in the form of isotherms, streamlines, pressure coefficients, drag
coefficients, Nusselt numbers, etc. The highest
value of pressure coefficient increases with blockage ratio for all cases. The
drag coefficient decreases with Re and shows complex phenomena with change in
Ri and blockage ratio of the channel. Pressure drag
has contributed more as compared with viscous drag in all cases. The curved
surface showed more heat transfer than the flat surface of the semi-circular
cylinder. The value of also has great influence at large value of Peclect numbers (=2500). Overall average heat transfer in
terms of average Nusselt number is a function of Ri, Re, Pr and . |
|
|
Record 4 of 19 |
Friction stir welding of nuclear
grade SA508Gr.3Cl.1 and SS304LN dissimilar steels |
Authors: Singh, RKR; Rathod, DW; Pandey, S |
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART C-JOURNAL
OF MECHANICAL ENGINEERING SCIENCE |
Volume: 232 Issue: 21 Pages: 3814-3822 Published: NOV
2018 Language: English Document
type: Article |
Abstract: The present work has been carried out to justify the feasibility of
dissimilar metal welds between nuclear grade SA508Gr.3Cl.1 ferritic steel and SS304LN stainless steel using friction
stir welding. The evaluation has been made by analysing the metallurgical and
mechanical properties of the friction stir welded dissimilar joint. Martensite formation and chemical variations in the weld
nugget have been confirmed with optical microscopy, micro-hardness
measurement and X-ray diffraction. The resultant chemistry variations owing
to solid-state mixing on metallurgical and associated mechanical properties
are significant. Transverse tensile tests and Charpy
impact tests suggest the required strength of the joint. The tensile
specimens were fractured from the SS304LN side, and similar sections of
stainless steel have been torn with severe plastic deformation. The
significant formation of martensite has not shown
any adverse effect on the joint properties. The tool wear rate of tungsten
carbide was high for this dissimilar weld. |
|
|
Record 5 of 19 |
A Markov based image forgery
detection approach by analyzing CFA artifacts |
Authors: Singh, A; Singh, G; Singh, K |
MULTIMEDIA TOOLS AND APPLICATIONS |
Volume: 77 Issue: 21 Pages: 28949-28968 Published: NOV
2018 Language: English Document
type: Article |
Abstract: The image acquisition device, the light is filtered through a Color Filter Array (CFA), where each pixel captures only
one color (from Red, Green, and Blue), while others
are calibrated. This process is known as interpolation process, and the artifacts introduced are called CFA or interpolation artifacts. The structure of these artifacts
in the image is disturbed while a forgery is introduced in an image. In this
paper, a high-order statistical approach is proposed to detect the
inconsistencies in the artifacts of different parts
of the image to expose any forgery present. The Markov Transition Probability
Matrix (MTPM) is employed to develop various features that will detect the
presence or absence of CFA artifacts in a
particular region of the image. The Markov random process is applied because
it provides an enhanced efficiency and reduced computational complexity for
the forgery detection model. The algorithm is tested on 2 x 2 pixel block of the image which provides the results of a
fine quality. There is no prior information of the location of the forged
region of the image. The algorithm is tested on various images, taken from
various social networking websites. The proposed forgery detection technique
outperforms the existing state-of-the-art techniques for the different
forgery scenarios by providing an average accuracy of 90.58%. |
|
|
Record 6 of 19 |
Emperor penguin optimizer: A
bio-inspired algorithm for engineering problems |
Authors: Dhiman, G; Kumar, V |
KNOWLEDGE-BASED SYSTEMS |
Volume: 159 Pages: 20-50 Published: NOV
1 2018 Language: English Document
type: Article |
Abstract: This paper proposes a novel optimization algorithm, called Emperor
Penguin Optimizer (EPO), which mimics the huddling behavior
of emperor penguins (Aptenodytes forsteri). The
main steps of EPO are to generate the huddle boundary, compute temperature
around the huddle, calculate the distance, and find the effective mover.
These steps are mathematically modeled and
implemented on 44 well-known benchmark test functions. It is compared with
eight state-of-the-art optimization algorithms. The paper also considers for
solving six real-life constrained and one unconstrained engineering design
problems. The convergence and computational complexity are also analyzed to ensure the applicability of proposed
algorithm. The experimental results show that the proposed algorithm is able
to provide better results as compared to the other well-known metaheuristic
algorithms. |
|
|
Record 7 of 19 |
A sustainable multi-parametric
sensors network topology for river water quality monitoring |
Authors: Jindal, H; Saxena, S; Kasana, SS |
WIRELESS NETWORKS |
Volume: 24 Issue: 8 Pages: 3241-3265 Published: NOV
2018 Language: English Document
type: Article |
Abstract: The deterioration of water quality due to natural and man-made hazards
has affected the life on the Earth. Hence, water quality needs to be
monitored regularly. The traditional approaches for monitoring are observed
to be more expensive, time consuming with complex infrastructure and are less
accurate. Therefore, there is a scope for improvement in monitoring
approaches. For the purpose, the paper has presented multi-parametric sensors
network topology (MPST). The topology has polyhedron infrastructure to
observe the temporal and spatial variations like electrical conductivity, pH,
temperature, chloride and dissolved oxygen; in shallow river water. Its main
features are energy efficient, in-expensive infrastructure that requires less
manpower, sustainable and can cope with varying currents of water. The MPST
is tested at Sutlej river, Bassi, Ludhiana in India
and the generated results are analyzed on various
physical parameters. Further, it is compared with traditional sampling method
for the accuracy. From the results, the topology is identified as an economical,
scalable and convenient way for river water quality monitoring. |
|
|
Record 8 of 19 |
EVaaS: Electric vehicle-as-a-service for energy trading in
SDN-enabled smart transportation system |
Authors: Aujla, GS; Jindal, A; Kumar, N |
COMPUTER NETWORKS |
Volume: 143 Pages: 247-262 Published: OCT
9 2018 Language: English Document
type: Article |
Abstract: The increased adoption of electric vehicles (EVs) in the daily life of
consumers have led towards the emergence of greener smart cities. However,
the problem of energy stability, i.e., balancing the demand and supply,
remains persistent in the context of charging stations (CSs). To solve this
problem, a unique conceptual solution using EVs has been presented in this
paper. The proposed solution deals with the problem of managing the
miscellaneous power or power deficit at the CSs by utilizing EVs-as-a-service
(EVaaS). On one hand, EVaaS
provides opportunities to the owner of EVs to earn profit and on the other
hand, it helps to balance the demand and supply at the CSs. This concept
works in two steps; (1) EV-as-a-buyer: EVs act as energy buyers and CSs act as
energy sellers, and (2) EV-as-a-seller: EVs act as energy sellers and CSs act
as energy buyers. In EVaaS paradigm, the CSs are
placed in residential, commercial, and industrial areas which broadcast their
price for buying (or selling) the deficit (or excess) power from (or to) the
EVs. The EVs would then decide whether to charge (or discharge) their battery
power from (or at) which CSs based on the factors such as-price and distance.
If both the parties come to an agreement, then the EVs would travel to the
specified location and exchange the energy with CSs. For the smooth movement
of EVs in the smart city, a mobility model is also designed. In addition,
this approach also utilizes the software defined networking (SDN) paradigm
for enabling faster communication between the entities involved. For this
purpose, a flow management scheme is designed for efficient data transfer
between EVs and CSs. Through this study, it has been shown that such a
strategy for energy trading would help the CSs to balance their load
requirements as well as provide profit to the EV owners. The results prove
that SDN improves the communication in terms of delay, throughput and network
utilization over the conventional networks; while EVs can be successfully
utilized to manage the load requirements of various CSs to gain a significant
amount of profit. (C) 2018 Elsevier B.V. All rights reserved. |
|
|
Record 9 of 19 |
Performance of low-cost country
sourcing projects - Conceptual model & empirical analysis |
Authors: Moser, R; Narayanamurthy, G; Kusaba, K; Kaiser, G |
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS |
Volume: 204 Pages: 30-43 Published: OCT
2018 Language: English Document
type: Article |
Abstract: Several of the firms have failed to achieve targeted performance in
their low-cost country sourcing (LCCS) projects. A clear need exists to
understand what drives the performance of LCCS projects and how they can be
worked around for achieving the targeted performance. In this study, we
evaluate the impact of LCCS project's characteristics on their performance
using contingency theory. We collected data from 177 professionals directly
involved in LCCS projects in automotive industry and used structural equation
modeling for conducting the analysis. Our results
convey that LCCS Project characteristics, namely Skill Management, Target
Management and Structure Management positively impacts Process Management of
LCCS project, which in turn positively drives the Performance of LCCS
project. We also find that LCCS project's Strategic Alignment positively
impacts Skill Management, Target Management and Structure Management. Results
from the analysis have implications for researchers and practitioners
attempting to understand and improve the performance of LCCS projects. |
|
|
Record 10 of 19 |
Participation of nucleons among
different harmonics of anisotropic flow |
Authors: Deepshikha; Kumar, S |
CANADIAN JOURNAL OF PHYSICS |
Volume: 96 Issue: 10 Pages: 1092-1097 Published: OCT
2018 Language: English Document
type: Article |
Abstract: We present the comprehensive interpretation of the momentum
distribution of nucleons participating in different kinds of nuclear flow,
within the framework of isospin-dependent quantum molecular dynamics (IQMD)
model. Our study reveals that the number of nucleons decreases with
increasing order of different harmonics < v1 >, < v2 >, < v3
>, and < v4 >. The magnitude of flow harmonics depends strongly on
transverse momentum. |
|
|
Record 11 of 19 |
|
Authors: Jawanda, AS; Batish,
A; Bedi, S |
INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY |
Volume: 99 Issue: 1-4 Pages: 461-474 Published: OCT
2018 Language: English Document
type: Article |
Abstract: Computer Numeric Control (CNC) milling lathes are used for
pseudo-symmetric ornamental woodworking. A stereolithography
(STL) part model is used for gouge-free toolpath generation using methods
such as the geometry offset method and the ball drop method. The tool
movement between cutter location (CL) points results in gouging of the STL
part at convex intersections of triangles (path-gouging). This path-gouging
can be controlled to be within user-specified tolerance, with large number of
equispaced points in forward and sidestep
directions. The resulting toolpath with large number of tool positions
considerably slows the machining process. There exists a need for a universal
method for efficiently eliminating this gouging and slowdown. In this work, a
refined ball drop method is presented that eliminates path-gouging and
reduces slowdown by automatically generating a variable step size in the side
step and forward directions. To further optimise the number of side steps
generated by the presented method, banding is used to reduce machining time
while minimising un-machined material and eliminating gouging. The developed
algorithm was tested on sample parts and verified by simulation and machining
of wooden parts. |
|
|
Record 12 of 19 |
Hydrothermal synthesis of
Eu3+-doped Gd2O3 nanophosphors and its Judd-Ofelt
analysis |
Authors: Priya, R; Pandey, OP |
VACUUM |
Volume: 156 Pages: 283-290 Published: OCT
2018 Language: English Document
type: Article; Proceedings Paper |
Abstract: A series of Gd2-xO3:x% Eu (x = 0 to 10 mol%) were synthesized by hydrothermal method. The
structural, morphological and optical properties of as-synthesized samples
were studied by X-ray diffraction, field emission scanning electron
microscopy (FE-SEM), energy dispersive X-ray analysis (EDX), FT-IR
spectroscopy, thermo-gravimetric analysis (TGA), differential scanning
calorimetric (DSC), UV/Vis spectroscopy and photoluminescence (PL)
spectroscopy techniques. The effect of the doping concentration has been studied
by experimental and theoretical methods. When the phosphors were exposed to
UV radiation (250 rim), they exhibited a sharp red emission at 611 rim which
corresponds to the hypersensitive D-5(0) -> F-7(2) transition of Eu3+
ions. The Judd-Ofelt parameters (Omega(2),
Omega(4) and Omega(6) and other spectral parameters were calculated using
Judd-Ofelt theory from emission spectra. The
pristine phosphors are expected to have tremendous applications in the field
of semiconductor devices, field emission displays and optical devices. |
|
|
Record 13 of 19 |
|
Authors: Gupta, P; Upadhyay, A |
EUROPEAN PHYSICAL JOURNAL A |
Volume: 54 Issue: 9 Published: SEP
26 2018 Language: English Document
type: Article |
Abstract: In this paper, we analyzed the
experimentally available radially excited charm mesons to predict the similar
spectra for the n = 2 bottom mesons. In the heavy quark effective theory, we
explore the flavor independent parameters Delta((b))(F) = Delta((c))(F) and Delta((b))(F) = Delta((c))(F) to
calculate the masses for the experimentally unknown n = 2 bottom mesons
B(2S), B(2P), B-S(2S) and B-S(2P). We have also analyzed
these bottom masses by applying the QCD and 1/mQ
corrections to the Lagrangian leading to the
modification of flavor symmetry parameters as
Delta((b))(F) = Delta((c))(F) delta Delta(F) and
Delta((b))(F) = Delta((c))(F)delta Delta(F). Further strong decay widths are
determined using these calculated masses to check the sensitivity of these
corrections for these radially excited mesons. The calculated decay widths
are in the form of strong coupling constant (g) over tilde HH, (g) over tilde
SH and (g) over tilde TH. We concluded that these corrections are less
sensitive for n = 2 masses as compared to n = 1 masses. Branching ratios and
branching fractions of these states are calculated to have a deeper
understanding of these states. These predicted values can be confronted with
the future experimental data. |
|
|
Record 14 of 19 |
|
Authors: Tiwari, D; Kaur, S; Bhunia, H; Bajpai, PK |
JOURNAL OF INDUSTRIAL AND ENGINEERING CHEMISTRY |
Volume: 65 Pages: 146-155 Published: SEP
25 2018 Language: English Document
type: Article |
Abstract: Carbon dioxide capture needs development of cost effective CO2 capture
technologies. This paper describes oxygen enriched nanostructured carbons
synthesized from nanocasting technique using
mesoporous silica as template and resorcinol-formaldehyde as precursor.
Carbonization at various temperatures (600 degrees C-800 degrees C) was
carried out to develop range of carbon adsorbents. Thorough characterization
of textural, surface and chemical properties was carried out on prepared
carbons and evaluated for CO2 capture performance using thermogravimetric
analyser under dynamic conditions. Highest dynamic CO2 uptake capacity was
reported to be 1.5 mmolg(-)(1), by SRF-700 at 30 degrees C in 100% pure CO2. The
CO2 uptake performance of the prepared carbons is affected by both the
textural properties and surface chemistry. Four adsorption-desorption cycles
established the material with complete stability and regenerability.
Fractional order kinetic model completely described CO2 adsorption on
prepared carbons. Thermodynamic parameter values suggested spontaneous,
random and exothermic nature of the process. Energetically heterogeneous
surface of adsorbent was confirmed by best fitting of Temkin
isotherm and random pattern of isosteric heat of
adsorption with surface coverage. Approximately, 1.82 MJ per kg CO2 thermal
energy is required for desorption process. (C) 2018 The Korean Society of
Industrial and Engineering Chemistry. Published by Elsevier B.V. All rights
reserved. |
|
|
Record 15 of 19 |
Donor-pi-acceptor (D-pi-A) dyad
for ratiometric detection of Hg2+ and PPi |
Authors: Rani, R; Kumar, G; Paul, K; Luxami, V |
NEW JOURNAL OF CHEMISTRY |
Volume: 42 Issue: 15 Pages: 12729-12736 Published: AUG
7 2018 Language: English Document
type: Article |
DOI: 10.1039/c8nj00741a |
Abstract: A donor-pi-acceptor (D-pi-A) dyad 1 has been successfully synthesized
by Linking phenanthrenequinone as an eLectron donor unit and anthraquinone
as an eLectron acceptor unit through a phenyl ring.
Dyad 1 exhibits intramolecular charge transfer and this is a key factor for
the detection of Hg2+ and of the pyrophosphate ion (P2O74-, PPi) in a semi-aqueous medium. Dyad 1 exhibits absorption
peaks at 430, 370, and 337 nm and an emission peak at 530 nm (lambda(ex) =
430 nm). Dyad 1 exhibits a new absorption peak at 390 nm ratiometrically
along with emission quenching in the presence of Hg2+ ions while the presence
of PPi results in drastic ratiometric
changes in the absorption and emission spectra with new peaks at 495 nm and
620 nm, respectiveLy. The quantum yield of dyad 1
on complexation with PPi was also increased from
0.1 (free dyad) to 0.69 (dyad 1.PPi). The Lowest detection Limits for Hg2+ and PPi
were found to be 31 nM and 46.5 nM,
respectiveLy. DFT calculations have been performed
to develop a mechanism for PPi and Hg2+ ion binding
with dyad 1. |
|
|
Record 16 of 19 |
Extended visual cryptography
techniques for true color images |
Authors: Dhiman, K; Kasana,
SS |
COMPUTERS & ELECTRICAL ENGINEERING |
Volume: 70 Pages: 647-658 Published: AUG
2018 Language: English Document
type: Article |
Abstract: In this work, two extended visual cryptography techniques for sharing color images are proposed. Three meaningful shares are
generated in both techniques using a block size of 5 x 5 corresponding to
each pixel of original secret image. First proposed technique is (3, 3)-EVCT
in which first share contains R component, second contains G component and
third contains B component of the secret image. All three shares are required
to reconstruct the original secret image on the receiver side. Second
technique is (2, 3)-EVCT in which any 2-out-of-3 shares are needed to recover
the original secret image on the receiver side. Out of these shares, first
share contains the RG components, second contains GB components and third
contains RB components of the secret image. All shares in both techniques are
meaningful as they contain the cover images along with the information of the
original secret image. These shares are made meaningful in order to increase
the security and to avoid the suspicion that something is hidden there. The
proposed techniques are lossless in nature and are less complex. The
dimensions of the original secret image, cover images, regenerated secret
image are same. The effectiveness of the proposed techniques have been shown by comparing their results with the
results of the existing techniques on the basis of various parameters. (C)
2017 Elsevier Ltd. All rights reserved. |
|
|
Record 17 of 19 |
A new method for segmentation of
pre-detected Devanagari words from the scene images: Pihu
method |
Authors: Jindal, K; Kumar, R |
COMPUTERS & ELECTRICAL ENGINEERING |
Volume: 70 Pages: 754-763 Published: AUG
2018 Language: English Document
type: Article |
Abstract: To date, only one method has reported on the segmentation of
pre-detected Devanagari words from natural scenic images. The present paper
discusses the limitations of the existing method and proposes a new robust
method called the "Pihu method" (Pihu is the lovely daughter of the first author). The
efficiency of the proposed method over the existing approach is demonstrated
by considering a challenging dataset of natural scenic images of Devanagari
script. The study shows that the character segmentation accuracy of the Pihu method was 92.11% and that of the existing method
was 55.77%. The results show that it takes the Pihu
method 2.70 s to segment an image, whereas the existing method takes 4.76 s.
(C) 2017 Elsevier Ltd. All rights reserved. |
|
|
Record 18 of 19 |
Effect of gate dielectric on the
performance of ZnO based thin film transistor |
Authors: Vyas, S; Dwivedi, ADD; Dwivedi, RD |
SUPERLATTICES AND MICROSTRUCTURES |
Volume: 120 Pages: 223-234 Published: AUG
2018 Language: English Document
type: Article |
Abstract: The paper report the fabrication and characterization of two different
sets of bottom gate top contact ZnO thin film
transistors (TFTs) using SiO2 and Al2O3 dielectric layers in an attempt to
compare and contrast the effect of gate dielectrics on performance of the two
devices. ZnO thin film and dielectric layers were
deposited at room temperature by radio frequency (RF) sputtering method. The
results were validated by those obtained using commercial software tool ATLAS
and an analytical model reported by others. The ZnO
TFT with Al2O3 dielectric exhibited superior electrical performance as
compared to the ZnO TFT with SiO2 dielectric. The
study also revealed that the performance of ZnO/Al2O3
based TFTs are far more consistent and reliable as compared to their ZnO/SiO2 counterpart. |
|
|
Record 19 of 19 |
|
Authors: He, DB; Kumar, N; Wang, HQ; Wang, LN; Choo, KKR; Vinel, A |
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING |
Volume: 15 Issue: 4 Pages: 633-645 Published: JUL-AUG
2018 Language: English Document
type: Article |
Abstract: With rapid developments of sensor, wireless and mobile communication
technologies, Mobile Healthcare Social Networks {MHSNs) have emerged as a
popular means of communication in healthcare services. Within MHSNs, patients
can use their mobile devices to securely share their experiences, broaden
their understanding of the illness or symptoms, form a supportive network,
and transmit information (e.g., state of health and new symptoms) between
users and other stake holders (e.g., medical center).
Despite the benefits afforded by MHSNs, there are underlying security and
privacy issues (e.g., due to the transmission of messages via a wireless
channel). The handshake scheme is an important cryptographic mechanism, which
can provide secure communication in MHSNs (e.g., anonymity and mutual
authentication between users, such as patients). In this paper, we present a
new framework for the handshake scheme in MHSNs, which is based on
hierarchical identity-based cryptography. We then construct an efficient
Cross-Domain Handshake (CDHS) scheme that allows symptoms-matching within
MHSNs For example, using the proposed CDHS scheme,
two patients registered with different healthcare centers
can achieve mutual authentication and generate a session key for future
secure communications. We then prove the security of the scheme, and a
comparative summary demonstrates that the proposed CDHS scheme requires fewer
computation and lower communication costs. We also implement the proposed
CDHS scheme and three related schemes in a proof of concept Android app to
demonstrate utility of the scheme. Findings from the evaluations demonstrate
that the proposed CDHS scheme achieves a reduction of 18.14 and 5.41 percent
in computation cost and communication cost, in comparison to three other related
handshake schemes. |