Next Article in Journal
Integrating Radio-Over-Fiber Communication System and BOTDR Sensor System
Next Article in Special Issue
Vehicle Cooperative Network Model Based on Hypergraph in Vehicular Fog Computing
Previous Article in Journal
Using the Decomposition-Based Multi-Objective Evolutionary Algorithm with Adaptive Neighborhood Sizes and Dynamic Constraint Strategies to Retrieve Atmospheric Ducts
Previous Article in Special Issue
Storage Management Strategy in Mobile Phones for Photo Crowdsensing
 
 
Article
Peer-Review Record

Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access

Sensors 2020, 20(8), 2231; https://doi.org/10.3390/s20082231
by Daoqi Han 1,2, Xiaofeng Du 1,3 and Yueming Lu 1,3,*
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Reviewer 3: Anonymous
Reviewer 4: Anonymous
Sensors 2020, 20(8), 2231; https://doi.org/10.3390/s20082231
Submission received: 13 February 2020 / Revised: 10 April 2020 / Accepted: 13 April 2020 / Published: 15 April 2020
(This article belongs to the Collection Fog/Edge Computing based Smart Sensing System)

Round 1

Reviewer 1 Report

1. In Section 2, references that are not closely related to the research content can be deleted.
2. The authors don't explain well which algorithms are existed and which are innovative in Section 3 and 4.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

This paper presents a lightweight cryptography and authentication protocol. The proposed scheme employs one-time association multitasking
proofs for peer to local authentication namely (OTMP-P2L). In addition, The scheme chooses relevant nondeterministic polynomial problem tasks and manages localized trust and anonymity by using smart edge devices. The paper has the following problems:

  1. Too many buzz words: edge, authentication, cryptography. blockchain..etc. I suggest to re-write the abstract and title to become clearer.
  2. In related work section: "
    Shi defined edge computin
    What is Shi?
  3. What are the paper contributions? Add them in the introduction?
  4. Table of related work missing. More recent work missing too such: Blockchain for Managing Heterogeneous Internet of Things: A Perspective Architecture, Providing Secure and Reliable Communication for Next Generation Networks in Smart Cities.
  5.  You need more discussion on the cons. algorithm used, cryptography, and testing environment.
  6. Discuss more on system complexity as well?

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 3 Report

In this paper,  the authors proposed a new scheme that employs one-time association multitasking6 proofs for peer to local authentication (OTMP-P2L). The scheme chooses relevant nondeterministic7 polynomial (NP) problem tasks, and manages localized trust and anonymity by using smart edge8 devices such as phones and tablets, thereby enabling IoT devices to perform consensus validation9 succinctly. This consensus string is a self-consistent one-time operator that combines multiple logic10 verification rules.

The author has done a good work and this research seems to be technically sound. The research paper is good to publish as it is. Congratulations to the authors.  

Author Response

Thank you very much for support. We will continue to go deep into this field.

Reviewer 4 Report

While this paper is interest, this manuscript itself requires a minor rewrite.

Some comments are listed as follows.

  1. The authors should present the homomorphism algorithm and the function E(x) in details. Which homomorphism algorithm was adopted in this study?
  2. The authors should give some case studies to explain each equation.
  3. The authors should provide some practical experimental results to compare the proposed method with other methods.
  4. In the last section, please focus on “Discussion, Implication, and Conclusion” to include
  • Discussion, Implication, and Conclusion
  • Discussion why the authors found out these results and how they comply (or not) with the Literature Review?
  • Conclusions
  • Academic Implications
  • Limitations of the paper
  • Future Studies and Recommendations
  1. The English of this paper should be polished and revised carefully, from the reviewer's point of view, the work should be written more objective and professional, things such as “we propose” should be avoided.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 2 Report

The authors have incorporated all my comments. I have no further comments.

Back to TopTop