2019
DOI: 10.1007/978-981-13-9680-9_7
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Lightweight ECC-Based Three-Way Authentication Scheme for IoT in Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…In this section, we present how the proposed scheme is more efficient than the existing schemes in terms of computation, communication, and storage cost, based on a performance analysis, an efficiency study, and a performance study. Note that to evaluate the performance of the proposed scheme, we selected nine recently published authentication schemes (i.e., [16][17][18][19][20][21][22][23][24][25]) that have focused on lightweight performance.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we present how the proposed scheme is more efficient than the existing schemes in terms of computation, communication, and storage cost, based on a performance analysis, an efficiency study, and a performance study. Note that to evaluate the performance of the proposed scheme, we selected nine recently published authentication schemes (i.e., [16][17][18][19][20][21][22][23][24][25]) that have focused on lightweight performance.…”
Section: Discussionmentioning
confidence: 99%
“…They also claimed that their scheme provides security against KCI attacks. Chatterjee et al [20] proposed an ECC-based lightweight three-way authentication scheme that protects against replay attacks, forward secrecy, and known session-specific temporary information attacks. They reported that their scheme provides security with low computation and communication overheads.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…is protocol is based on elliptic curve cryptography (ECC) which is measured better than the traditional RSA encryption algorithm. Furthermore, in addition, various authentication protocol based on ECC are proposed in [111][112][113][114][115]. Elliptic curve cryptography is considered more efficient and more secure especially for systems with limited memory and processing capabilities.…”
Section: Ecc-based Mutual Authenticationmentioning
confidence: 99%
“…Additionally, ECC is used to ensure the integrity of transmitted messages and non-repudiation using elliptic curve digital signature algorithms (ECDSA) [33,34]. Many schemes use ECC to secure communications, and these schemes vary depending on the type of ECC that used [35][36][37]. For instance, some schemes use ECC to exchange a shared key between two parties, other schemes are applied to secure the confidentiality and integrity of messages.…”
Section: Preliminary: Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%