2023
DOI: 10.1155/2023/9731239
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability

Abstract: With the rapid development of Internet of Things (IoT), designing a secure two-factor authentication scheme for IoT is becoming increasingly demanding. Two-factor protocols are deployed to achieve a higher security level than single-factor protocols. Given the resource constraints of IoT devices, other factors such as biometrics are ruled out as additional authentication factors due to their large overhead. Smart cards are also prone to side-channel attacks. Therefore, historical big data have gained interest … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 29 publications
0
1
0
Order By: Relevance
“…Algardi et al (2022) proposed a framework that focuses on managing authentication keys, which are crucial for ensuring secure access to and communication within a big data environment. Zahednejad et al (2023) proposed a scheme that addressed the challenges of authentication and key agreement in IoT systems, with a particular focus on revocability. The scheme aimed to provide efficient and secure authentication and key management for IoT devices in a big data environment.…”
Section: Threshold Cryptographymentioning
confidence: 99%
“…Algardi et al (2022) proposed a framework that focuses on managing authentication keys, which are crucial for ensuring secure access to and communication within a big data environment. Zahednejad et al (2023) proposed a scheme that addressed the challenges of authentication and key agreement in IoT systems, with a particular focus on revocability. The scheme aimed to provide efficient and secure authentication and key management for IoT devices in a big data environment.…”
Section: Threshold Cryptographymentioning
confidence: 99%