2018
DOI: 10.1007/s12652-018-0937-6
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight hierarchical authentication scheme for internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…They also compared the performance and privacy of their suggested technique to those of current solutions. Compared to alternative methods, the results demonstrated the suggested scheme's efficacy and safety [20].…”
Section: The Related Workmentioning
confidence: 86%
“…They also compared the performance and privacy of their suggested technique to those of current solutions. Compared to alternative methods, the results demonstrated the suggested scheme's efficacy and safety [20].…”
Section: The Related Workmentioning
confidence: 86%
“…They are widely used to provide confidentiality by encrypting large amounts of data, either locally or over network communication. Recently, more research has been done on the design of lightweight cryptographic (LWC) schemes which are suitable for resource-constrained devices in applications, such as the Internet of Things, 30,31 cloud computing, 32,33 healthcare, and mobile networks. 34 Given their extensive usage, it is crucial to evaluate the security of block ciphers, and especially lightweight ciphers in the LWC domain.…”
Section: Motivationmentioning
confidence: 99%
“…Internet of ings (IoT) is a next-generation information network that integrates the radio frequency identification technology and sensor technology based on induction equipment into the Internet. Hierarchical sharing technology of information resources has become a hot topic in the research of the Internet of ings [6,7], which enables items' information to be accurately, safely, and efficiently located and queried. At present, the Internet of things and the underlying information resources information resources sharing layering technology research mainly focuses on two basic aspects: one is about the Internet of things RFID Savant middleware [8], hierarchy, found [9,10] RFID information service, trusted query mechanism [11], and the Internet information resources in the center of the recognition named or information resources sharing layered model [12]; the underlying technologies such as research put forward is the most representative of Internet information resources sharing layered model; the second is the research on the trust-driven management and scheduling algorithm of Internet resources or cloud resources [13].…”
Section: Related Workmentioning
confidence: 99%