2017
DOI: 10.1007/s11227-017-2048-0
|View full text |Cite
|
Sign up to set email alerts
|

A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
169
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 199 publications
(169 citation statements)
references
References 35 publications
0
169
0
Order By: Relevance
“…In 2015, Kalra and Sood [53] reported an authentication scheme to connect resource-constrained devices (tiny devices) to the cloud server using Elliptic Curve Cryptography (ECC) for Internet of Things (IoT). However, in 2017, S. Kumari et al [48] have shown that Kalra and Sood's scheme [53] is vulnerable to offline password guessing and privileged insider attacks and does not achieve device anonymity, session key agreement and mutual authentication. To mitigate these vulnerabilities, S. Kumari et al [48] proposed a secure authentication scheme based on ECC for IoT and cloud.…”
Section: Issues In Recent Single Server Akap For Cloud Platformmentioning
confidence: 99%
See 4 more Smart Citations
“…In 2015, Kalra and Sood [53] reported an authentication scheme to connect resource-constrained devices (tiny devices) to the cloud server using Elliptic Curve Cryptography (ECC) for Internet of Things (IoT). However, in 2017, S. Kumari et al [48] have shown that Kalra and Sood's scheme [53] is vulnerable to offline password guessing and privileged insider attacks and does not achieve device anonymity, session key agreement and mutual authentication. To mitigate these vulnerabilities, S. Kumari et al [48] proposed a secure authentication scheme based on ECC for IoT and cloud.…”
Section: Issues In Recent Single Server Akap For Cloud Platformmentioning
confidence: 99%
“…However, in 2017, S. Kumari et al [48] have shown that Kalra and Sood's scheme [53] is vulnerable to offline password guessing and privileged insider attacks and does not achieve device anonymity, session key agreement and mutual authentication. To mitigate these vulnerabilities, S. Kumari et al [48] proposed a secure authentication scheme based on ECC for IoT and cloud. In this scheme, authors have claimed that their scheme achieves all security requirements and is resistant to various known attacks as compared to the Kalra and Sood's scheme.…”
Section: Issues In Recent Single Server Akap For Cloud Platformmentioning
confidence: 99%
See 3 more Smart Citations