2018
DOI: 10.1109/tii.2017.2773666
|View full text |Cite
|
Sign up to set email alerts
|

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
194
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 335 publications
(194 citation statements)
references
References 28 publications
0
194
0
Order By: Relevance
“…Authentication with key agreement protocol as a widely used security mechanism has been applied in many settings, such as wireless body area networks, global mobility networks in smart city, and internet of things (IoT) . Among them, Porambage et al made use of the implicit certificate to design a 2‐phase authentication protocol for wireless sensor networks in distributed IoT applications, and Turkanovi truec´ et al designed an authentication with key agreement protocol for wireless sensor networks based on IoT notion.…”
Section: Introductionmentioning
confidence: 99%
“…Authentication with key agreement protocol as a widely used security mechanism has been applied in many settings, such as wireless body area networks, global mobility networks in smart city, and internet of things (IoT) . Among them, Porambage et al made use of the implicit certificate to design a 2‐phase authentication protocol for wireless sensor networks in distributed IoT applications, and Turkanovi truec´ et al designed an authentication with key agreement protocol for wireless sensor networks based on IoT notion.…”
Section: Introductionmentioning
confidence: 99%
“…AAoT integrity and authenticity are achieved by memory-based attestation and PUF-based authentication. In [43], a lightweight IoT-based authentication scheme in cloud computing circumstance presents robustness against different types of attacks and provides mutual authentication. e performance evaluation of this scheme delineates a highly suitable authentication scheme for real IoT-cloud circumstances.…”
Section: Discussionmentioning
confidence: 99%
“…Table 7 illustrates the comparison of this scheme with another two relevant ones. In terms of security and efficiency, [43] delineates superior results than the other two schemes.…”
Section: Ruta Et Al [75]mentioning
confidence: 97%
“…A variety of solutions are proposed using various cryptographic algorithms and protocols [139][140][141][142][143] and architectures using supporting authentication servers [144][145][146].…”
Section: Research In Secure Data Transmissionmentioning
confidence: 99%