{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:40:09Z","timestamp":1731026409787,"version":"3.28.0"},"reference-count":59,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T00:00:00Z","timestamp":1727913600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1016\/j.adhoc.2024.103669","type":"journal-article","created":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T15:54:31Z","timestamp":1727970871000},"page":"103669","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security"],"prefix":"10.1016","volume":"166","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1655-8514","authenticated-orcid":false,"given":"Mohammed","family":"Al-Khalidi","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2198-7794","authenticated-orcid":false,"given":"Rabab","family":"Al-Zaidi","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8380-1625","authenticated-orcid":false,"given":"Tarek","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Safiullah","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2601-9327","authenticated-orcid":false,"given":"Ali Kashif","family":"Bashir","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2019","author":"Bozicevic","series-title":"41.6 Billion IoT devices will be generating 79.4 zettabytes of data in 2025","key":"10.1016\/j.adhoc.2024.103669_b1"},{"year":"2024","author":"Ofcom","series-title":"More radio spectrum for the Internet of Things","key":"10.1016\/j.adhoc.2024.103669_b2"},{"key":"10.1016\/j.adhoc.2024.103669_b3","doi-asserted-by":"crossref","first-page":"29493","DOI":"10.1109\/ACCESS.2022.3158943","article-title":"Cybersecurity attacks on software logic and error handling within AIS implementations: A systematic testing of resilience","volume":"10","author":"Khandker","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2024.103669_b4","series-title":"2019 7th International Conference on Future Internet of Things and Cloud (FiCloud)","first-page":"125","article-title":"Securing marine data networks in an IoT environment","author":"Al-Khalidi","year":"2019"},{"year":"2024","author":"International Maritime Organization","series-title":"Maritime security and piracy 2022","key":"10.1016\/j.adhoc.2024.103669_b5"},{"year":"2020","author":"World Economic Forum","series-title":"Global risks report 2020","key":"10.1016\/j.adhoc.2024.103669_b6"},{"issue":"5","key":"10.1016\/j.adhoc.2024.103669_b7","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1109\/JSEN.2018.2791487","article-title":"Building novel VHF-based wireless sensor networks for the internet of marine things","volume":"18","author":"Al-Zaidi","year":"2018","journal-title":"IEEE Sens. J."},{"issue":"10","key":"10.1016\/j.adhoc.2024.103669_b8","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.12941","article-title":"A distributed identity-based authentication scheme for internet of things devices using permissioned blockchain system","volume":"39","author":"Babu","year":"2022","journal-title":"Expert Syst."},{"key":"10.1016\/j.adhoc.2024.103669_b9","series-title":"Computer Security\u2013ESORICS 2007: 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24\u201426, 2007. Proceedings 12","first-page":"139","article-title":"Generalized key delegation for hierarchical identity-based encryption","author":"Abdalla","year":"2007"},{"year":"1997","author":"Fuller","series-title":"Satisfying naval low data rate mobile communication requirements","key":"10.1016\/j.adhoc.2024.103669_b10"},{"key":"10.1016\/j.adhoc.2024.103669_b11","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2023.3282781","article-title":"EC-crypto: Highly efficient area-delay optimized elliptic curve cryptography processor","author":"Javeed","year":"2023","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.adhoc.2024.103669_b12","first-page":"127","article-title":"Authentication protocol for enhanced security of the automatic identification system","volume":"133","author":"Litts","year":"2021","journal-title":"Nav. Eng. J."},{"key":"10.1016\/j.adhoc.2024.103669_b13","series-title":"2020 IEEE Conference on Communications and Network Security","first-page":"1","article-title":"SecureAIS-securing pairwise vessels communications","author":"Aziz","year":"2020"},{"issue":"4","key":"10.1016\/j.adhoc.2024.103669_b14","doi-asserted-by":"crossref","first-page":"2709","DOI":"10.1109\/TDSC.2021.3069428","article-title":"Auth-AIS: secure, flexible, and backward-compatible authentication of vessels AIS broadcasts","volume":"19","author":"Sciancalepore","year":"2021","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"10.1016\/j.adhoc.2024.103669_b15","doi-asserted-by":"crossref","first-page":"41","DOI":"10.7763\/IJCCE.2014.V3.289","article-title":"Enhancing security for mobile ad hoc networks by using identity based cryptography","volume":"3","author":"Honarbakhsh","year":"2014","journal-title":"Int. J. Comput. Commun. Eng."},{"issue":"5","key":"10.1016\/j.adhoc.2024.103669_b16","first-page":"1173","article-title":"Identity based cryptography for mobile ad hoc networks","volume":"95","author":"Narayana","year":"2017","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"10.1016\/j.adhoc.2024.103669_b17","doi-asserted-by":"crossref","DOI":"10.1109\/TITS.2022.3188691","article-title":"AISChain: Blockchain-based AIS data platform with dynamic bloom filter tree","author":"Duan","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"11","key":"10.1016\/j.adhoc.2024.103669_b18","doi-asserted-by":"crossref","first-page":"5015","DOI":"10.3390\/app11115015","article-title":"AIS data vulnerability indicated by a spoofing case-study","volume":"11","author":"Androjna","year":"2021","journal-title":"Appl. Sci."},{"issue":"3","key":"10.1016\/j.adhoc.2024.103669_b19","doi-asserted-by":"crossref","first-page":"429","DOI":"10.12716\/1001.12.03.01","article-title":"A taxonomy framework for maritime cybersecurity: A demonstration using the automatic identification system","volume":"12","author":"Kessler","year":"2018","journal-title":"TransNav: Int. J. Mar. Navig. Saf. Sea Transp."},{"issue":"2","key":"10.1016\/j.adhoc.2024.103669_b20","doi-asserted-by":"crossref","first-page":"287","DOI":"10.12716\/1001.14.02.03","article-title":"Secure ais with identity-based authentication and encryption","volume":"14","author":"Goudosis","year":"2020","journal-title":"TransNav: Int. J. Mar. Navig. Saf. Sea Transp."},{"issue":"6","key":"10.1016\/j.adhoc.2024.103669_b21","doi-asserted-by":"crossref","first-page":"5399","DOI":"10.1109\/TVT.2018.2805700","article-title":"SecureGuard: A certificate validation system in public key infrastructure","volume":"67","author":"Alrawais","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.adhoc.2024.103669_b22","doi-asserted-by":"crossref","DOI":"10.1109\/TVT.2024.3367945","article-title":"Big data-enabled authentication framework for offshore maritime communication using drones","author":"Vangala","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.adhoc.2024.103669_b23","doi-asserted-by":"crossref","first-page":"279","DOI":"10.12716\/1001.14.02.02","article-title":"Protected AIS: A demonstration of capability scheme to provide authentication and message integrity","volume":"14","author":"Kessler","year":"2020","journal-title":"TransNav: Int. J. Mar. Navig. Saf. Sea Transp."},{"issue":"2","key":"10.1016\/j.adhoc.2024.103669_b24","first-page":"97","article-title":"S3 (secure ship-to-ship) information sharing scheme using ship authentication in the e-navigation","volume":"9","author":"Oh","year":"2015","journal-title":"Int. J. Secur. Appl."},{"issue":"2","key":"10.1016\/j.adhoc.2024.103669_b25","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1109\/TIFS.2016.2622682","article-title":"Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system","volume":"12","author":"He","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.adhoc.2024.103669_b26","article-title":"An IOT-enabled system for marine data acquisition and cartography","volume":"5","author":"Al-Zaidi","year":"2017","journal-title":"Trans. Netw. Commun."},{"issue":"6","key":"10.1016\/j.adhoc.2024.103669_b27","article-title":"(AMDC) algorithm for wireless sensor networks in the marine environment","volume":"6","author":"Mohsin","year":"2015","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"10.1016\/j.adhoc.2024.103669_b28","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/s00773-018-0561-3","article-title":"Towards a secure automatic identification system (AIS)","volume":"24","author":"Goudossis","year":"2019","journal-title":"J. Mar. Sci. Technol."},{"issue":"2","key":"10.1016\/j.adhoc.2024.103669_b29","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1109\/TGCN.2021.3126618","article-title":"SEAT: secure and energy efficient anonymous authentication with trajectory privacy-preserving scheme for marine traffic management","volume":"6","author":"Jegadeesan","year":"2021","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"10.1016\/j.adhoc.2024.103669_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.marpol.2024.106244","article-title":"A confidentiality preserved data sharing framework for decision support in the maritime law enforcement","volume":"167","author":"Sun","year":"2024","journal-title":"Mar. Policy"},{"issue":"2","key":"10.1016\/j.adhoc.2024.103669_b31","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1017\/S0373463321000837","article-title":"Securing the automatic identification system (AIS): Using public key cryptography to prevent spoofing whilst retaining backwards compatibility","volume":"75","author":"Wimpenny","year":"2022","journal-title":"J. Navig."},{"key":"10.1016\/j.adhoc.2024.103669_b32","doi-asserted-by":"crossref","DOI":"10.1155\/2023\/1814053","article-title":"Secure marine environment communication: A multiobject authentication protocol based on secret sharing","volume":"2023","author":"Ye","year":"2023","journal-title":"Int. J. Intell. Syst."},{"key":"10.1016\/j.adhoc.2024.103669_b33","series-title":"2016 14th Annual Conference on Privacy, Security and Trust","first-page":"219","article-title":"Using machine learning to secure IoT systems","author":"Canedo","year":"2016"},{"year":"2024","author":"Xiaojun","series-title":"Background: GNSS spoofing in China and beyond","key":"10.1016\/j.adhoc.2024.103669_b34"},{"year":"2024","author":"Goward","series-title":"AIS mystery: 12 ships appear to cross continents and drive in circles","key":"10.1016\/j.adhoc.2024.103669_b35"},{"year":"2024","series-title":"U.S. issues renewed mariner warning on GPS interference","key":"10.1016\/j.adhoc.2024.103669_b36"},{"key":"10.1016\/j.adhoc.2024.103669_b37","series-title":"2020 European Navigation Conference","first-page":"1","article-title":"Detection of GNSS spoofing using NMEA messages","author":"Lee","year":"2020"},{"year":"2015","author":"Bazyar","series-title":"A Novel and Low-Cost Technique for Generating GPS Spoofing Data in order to Protection from Marine Navigation Systems","key":"10.1016\/j.adhoc.2024.103669_b38"},{"year":"2017","author":"Hassani","article-title":"Cyber security issues in navigation systems of marine vessels from a control perspective","series-title":"International Conference on Offshore Mechanics and Arctic Engineering, Vol. 57748","key":"10.1016\/j.adhoc.2024.103669_b39"},{"key":"10.1016\/j.adhoc.2024.103669_b40","series-title":"2018 Global Internet of Things Summit","first-page":"1","article-title":"A practical performance comparison of ECC and RSA for resource-constrained IoT devices","author":"Su\u00e1rez-Albela","year":"2018"},{"issue":"177","key":"10.1016\/j.adhoc.2024.103669_b41","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz","year":"1987","journal-title":"Math. Comput."},{"key":"10.1016\/j.adhoc.2024.103669_b42","series-title":"Conference on the Theory and Application of Cryptographic Techniques","first-page":"417","article-title":"Use of elliptic curves in cryptography","author":"Miller","year":"1985"},{"key":"10.1016\/j.adhoc.2024.103669_b43","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1016\/j.ins.2018.03.053","article-title":"A pairing-free and provably secure certificateless signature scheme","volume":"450","author":"Karati","year":"2018","journal-title":"Inform. Sci."},{"unstructured":"A.S. Bhala, V.P. Kshirsagar, M.B. Nagori, M.K. Deshmukh, Performance comparison of elliptical curve and rsa digital signature on arm7, in: Proceedings of International Conference on Information and Network Technology, ICINT 2011, 2011.","key":"10.1016\/j.adhoc.2024.103669_b44"},{"unstructured":"K. Magons, Applications and Benefits of Elliptic Curve Cryptography, in: SOFSEM (Student Research Forum Papers\/Posters), 2016, pp. 32\u201342.","key":"10.1016\/j.adhoc.2024.103669_b45"},{"key":"10.1016\/j.adhoc.2024.103669_b46","series-title":"2020 4th Cyber Security in Networking Conference","first-page":"1","article-title":"Activation of lorawan end devices by using public key cryptography","author":"M\u00e5rlind","year":"2020"},{"issue":"1","key":"10.1016\/j.adhoc.2024.103669_b47","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/09720529.2018.1564201","article-title":"Forty years of attacks on the RSA cryptosystem: A brief survey","volume":"22","author":"Mumtaz","year":"2019","journal-title":"J. Discrete Math. Sci. Cryptogr."},{"issue":"1","key":"10.1016\/j.adhoc.2024.103669_b48","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-021-3354-7","article-title":"Quantum-safe cryptography: crossroads of coding theory and cryptography","volume":"65","author":"Wang","year":"2022","journal-title":"Sci. China Inf. Sci."},{"key":"10.1016\/j.adhoc.2024.103669_b49","series-title":"2021 5th International Conference on Information Systems and Computer Networks","first-page":"1","article-title":"On post quantum wireless communication security","author":"Misra","year":"2021"},{"year":"2005","author":"Youngblood","first-page":"1","series-title":"An introduction to identity-based cryptography","key":"10.1016\/j.adhoc.2024.103669_b50"},{"issue":"4","key":"10.1016\/j.adhoc.2024.103669_b51","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1109\/TCC.2020.2973623","article-title":"Comments on \u201cSecure data sharing in cloud computing using revocable-storage identity-based encryption\u201d","volume":"8","author":"Lee","year":"2020","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.adhoc.2024.103669_b52","series-title":"International Conference on the Theory and Application of Cryptology and Information Security","first-page":"452","article-title":"Certificateless public key cryptography","author":"Al-Riyami","year":"2003"},{"key":"10.1016\/j.adhoc.2024.103669_b53","series-title":"2014 23rd International Conference on Computer Communication and Networks","first-page":"1","article-title":"A light-weight certificate-less public key cryptography scheme based on ECC","author":"Yao","year":"2014"},{"key":"10.1016\/j.adhoc.2024.103669_b54","series-title":"2021 International Conference on Computing, Communication, and Intelligent Systems","first-page":"64","article-title":"Defense against frequency analysis in elliptic curve cryptography using k-means clustering","author":"Padma","year":"2021"},{"issue":"1","key":"10.1016\/j.adhoc.2024.103669_b55","first-page":"59","article-title":"Key generation in cryptography using elliptic-curve cryptography and genetic algorithm","volume":"59","author":"Kumar","year":"2023","journal-title":"Eng. Proc."},{"key":"10.1016\/j.adhoc.2024.103669_b56","doi-asserted-by":"crossref","first-page":"109580","DOI":"10.1109\/ACCESS.2022.3208169","article-title":"A hybrid sperm swarm optimization and genetic algorithm for unimodal and multimodal optimization problems","volume":"10","author":"Raj","year":"2022","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.adhoc.2024.103669_b57","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/TEMC.2022.3161298","article-title":"Optimization of high-speed channel for signal integrity with deep genetic algorithm","volume":"64","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Electromagn. Compat."},{"key":"10.1016\/j.adhoc.2024.103669_b58","doi-asserted-by":"crossref","DOI":"10.1109\/LPT.2023.3325635","article-title":"Improved particle swarm optimization with less manual intervention for photonic inverse design","author":"Zhang","year":"2023","journal-title":"IEEE Photonics Technol. Lett."},{"year":"2023","author":"Tellez","series-title":"Comparing AI algorithms for optimizing elliptic curve cryptography parameters in third-party E-commerce integrations: A pre-quantum era analysis","key":"10.1016\/j.adhoc.2024.103669_b59"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870524002804?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870524002804?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:13:22Z","timestamp":1731024802000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870524002804"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":59,"alternative-id":["S1570870524002804"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2024.103669","relation":{},"ISSN":["1570-8705"],"issn-type":[{"type":"print","value":"1570-8705"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2024.103669","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"103669"}}