2020
DOI: 10.1109/jsyst.2020.2970167
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 115 publications
(38 citation statements)
references
References 30 publications
0
38
0
Order By: Relevance
“…After the registration of these entities, the registration values are stored in the memory of these devices and also in the smartphone/smart card of the users. These stored values will further help in the login, authentication, and key establishment processes [44]. The registration process is then summarised in Algorithm 1.…”
Section: The Proposed Generalized Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…After the registration of these entities, the registration values are stored in the memory of these devices and also in the smartphone/smart card of the users. These stored values will further help in the login, authentication, and key establishment processes [44]. The registration process is then summarised in Algorithm 1.…”
Section: The Proposed Generalized Frameworkmentioning
confidence: 99%
“…Without guessing the correct session keys, the attacker cannot decrypt the exchanged messages. Therefore, the ongoing communication is safe and secure against the various potential attacks [44,45]. This phase is summarised in Algorithm 3.…”
Section: Authentication and Session Keymentioning
confidence: 99%
“…Third, KMMR adds and revokes efficient secure nodes. ECC is an ondemand routing network protocol which is specially design for wireless sensor network and ad hoc [15,16].…”
Section: Related Workmentioning
confidence: 99%
“…However, IBE-ECC depends on a pre-shared key-based Diffie-Hellman exchange which is not enough to create secure encryption. Hammi et al [ 27 ] proposed OTP that relies on Elliptic Curve Cryptography and Isogeny. Ayoub et al [ 28 ] proposed a secure authentication and encryption based on improved ECC which is an asymmetric encryption scheme based on user credentials and biometric parameters.…”
Section: Related Work On Cryptographic and Digital Certificate Algorithms On Iotmentioning
confidence: 99%
“…The limitations of previous literature studies [ 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 ] can be divided into three types: Firstly, most of these research studies did not consider the hardware resource constraints and the appropriate architecture of IoT in the design of digital signature and cryptographic schemes is not considered. Secondly, the vulnerabilities of ECDH on IIoT were not covered and investigated as well.…”
Section: Related Work On Cryptographic and Digital Certificate Algorithms On Iotmentioning
confidence: 99%