2022
DOI: 10.32604/cmc.2022.018589
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs)

Abstract: IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in the Internet of Things (IoTs). 6LoWPAN allows nodes with limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard, thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network. The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption Standard), but … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…2-Broken Authentication [20]: Authentication enables applications to identify and verify their users. As a consequence, deactivated authentication may enable attackers to get access to and acquire the same rights as the target user, resulting in significant security holes in the online application.…”
Section: Previous Studies and Related Workmentioning
confidence: 99%
“…2-Broken Authentication [20]: Authentication enables applications to identify and verify their users. As a consequence, deactivated authentication may enable attackers to get access to and acquire the same rights as the target user, resulting in significant security holes in the online application.…”
Section: Previous Studies and Related Workmentioning
confidence: 99%
“…Over the years, there has been a significant increase in the number of cyber attacks worldwide, leading to extensive damage [1] [2] . They are often attacks on the information system, to get, change or temper the data, hence achieving any ultimate goal e.g.…”
Section: Introductionmentioning
confidence: 99%
“…Purchasing malware is also incredibly easy - it can be done in just a few minutes. Paid malware tools typically come with customer support, including free updates and troubleshooting services [8] [2] .…”
Section: Introductionmentioning
confidence: 99%
“…The increase in the number of applications makes it difficult for users to choose the appropriate application for them in several aspects, the most important of which is the safety of that application. By some estimates, one out of every 36 mobile devices have high-risk apps installed [1]. Determining an application's security is not easy, especially for those who do not have any technological knowledge, so we decided to determine the level of security for the application by analyzing user reviews using sentiment analysis, which studies have proven successful in many areas.…”
Section: Introductionmentioning
confidence: 99%