2022
DOI: 10.1109/tdsc.2022.3178115
|View full text |Cite
|
Sign up to set email alerts
|

A Full Lifecycle Authentication Scheme for Large-scale Smart IoT Applications

Abstract: The rapid development of IoT (Internet of Things) brings great convenience to people through the utilization of IoT applications, but also brings huge security challenges. Existing IoT security breaches show that many IoT devices have authentication flaws. Although many IoT authentication schemes were proposed, they are not fit for recent smart IoT applications covering IoT device, back-end sever, and user-end mobile applications. To build the first line of defense for smart IoT systems, this paper proposes a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 39 publications
0
13
0
Order By: Relevance
“…Smart IoT: Spanning smart cities, smart homes, and intelligent applications, research papers [65,69,70], contributing 8% in this domain, are dedicated to the development of IoT authentication mechanisms.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Smart IoT: Spanning smart cities, smart homes, and intelligent applications, research papers [65,69,70], contributing 8% in this domain, are dedicated to the development of IoT authentication mechanisms.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
“…Mobile: The domain of Mobile IoT is accentuated by 3%, and the research [70,71], is dedicated to enhancing security in the mobile IoT environment. The spotlight is on a mutual identity authentication scheme for mobile IoT devices, showcasing a nuanced approach to bolstering security.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
“…On the other side, few articles have been published that can also be used in the metaverse environment [4]. The papers [17]- [19] presented authentication mechanisms using ECC; however, security analysis done in [20], [21] depicts that they are vulnerable to different types of attacks.…”
Section: Related Workmentioning
confidence: 99%
“…However, the security verification of [4] depicts that it is prone to impersonation attacks. Apart from that, the protocols [17]- [19] can also be applied in metaverse environment but is prone to various attacks [4], [20], [21] that makes them unsuitable for the metaverse environment. On the other side, our proposed metaverse protocol handles the impersonation attack as well as others, as shown in Table III.…”
Section: A Comparison Of Security Featuresmentioning
confidence: 99%
“…They analyzed the security aspects of their scheme using the AVISPA tool. However, Chen et al [23] asserted that the scheme proposed by Panda and Chattopadhyay does not consider various security features such as stolen smartcards and user impersonation attacks. Haq et al [24] proposed a two-factor authentication protocol for 5G networks and they performed informal and formal security analyses to prove that their scheme can prevent a variety of security attacks.…”
Section: Related Workmentioning
confidence: 99%