Trusted Personalized and Contextualized E-Commerce Services for Consumer Electronics over Wireless Sensor Network

Deshmukh, Araddhana Arvind ; Alsaadi, Mahmood ; Pamba, Raja Varma ; Suri, Ashish ; Khan, Rijwan ; Dutta, Ashit Kumar ; Gupta, Koppuravuri Gurnadha ; Quraishi, Aadam (2024) Trusted Personalized and Contextualized E-Commerce Services for Consumer Electronics over Wireless Sensor Network IEEE Transactions on Consumer Electronics . p. 1. ISSN 0098-3063

Full text not available from this repository.

Official URL: https://doi.org/10.1109/TCE.2024.3414274

Related URL: http://dx.doi.org/10.1109/TCE.2024.3414274

Abstract

Wireless sensor network-based edge computing (WEC) technology enables e-commerce to provide reliable and real-time services over the wireless sensor network (WSN). To enable efficient pseudonym updates and pseudonym tracking, an access point pseudonym management method for wireless edge computing is described in personalization and contextualization e-commerce services. Instead of the central cloud, the edge cloud with high real-time performance authenticates the access point identity, which increases identity authentication and pseudonym update. This study presents an access point pseudonym management strategy for edge computing based on wireless sensor network, addressing the security concern of leakage of SNU pseudonym information in the edge data center. To maintain the confidentiality of pseudonym information, it is homomorphically encrypted. Each WSN pseudonym table is associated with a search word, and the system’s highest authority can calculate the search word from pseudonym table ciphertext to reveal enemy SNUs’ true identities and achieve pseudonym traceability. According to established security theory, the approach is indistinguishable during a chosen-plaintext attack. Access point anonymity, message integrity, and nonrepudiation security studies in the system satisfy Internet of Consumer Electronics Access Point standards for identity privacy protection. The performance of identity authentication, pseudonym request, and homomorphic encryption is studied and simulated.

Item Type:Article
Source:Copyright of this article belongs to 2025 IEEE.
Keywords:Wireless sensor networks; Cloud computing; Consumer electronics; Authentication; Communication system security; Real-time systems; Edge computing.
ID Code:139473
Deposited On:23 Aug 2025 13:32
Last Modified:23 Aug 2025 13:32

Repository Staff Only: item control page