2018
DOI: 10.1002/ett.3292
|View full text |Cite
|
Sign up to set email alerts
|

A secure lightweight signature based authentication for Cloud‐IoT crowdsensing environments

Abstract: Crowdsensing utilizes the wisdom of crowd by sensing the information through different types of smart devices such as a smartphone, tablet, and sensors to serve the problem of common interests. It can be achieved by the concept of Internet of Things (IoT), which considers a large set of smart sensing interconnected devices. However, these devices are resource constrained in terms of storage, infrastructure, and computation power, and therefore, cloud technology is required. In order to minimize the storage ove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 40 publications
0
15
0
Order By: Relevance
“…In implementing various applications of the IoT, security 9 and efficiency 10,11 are mostly concerned. To widely collect sensory data and construct efficient MCS applications, multidimensional sensory data are often aggregated in the cloud platform.…”
Section: Introductionmentioning
confidence: 99%
“…In implementing various applications of the IoT, security 9 and efficiency 10,11 are mostly concerned. To widely collect sensory data and construct efficient MCS applications, multidimensional sensory data are often aggregated in the cloud platform.…”
Section: Introductionmentioning
confidence: 99%
“…With the promotion of Internet technology and the popularization of smart devices, the Internet of Thing (IoT) 1 has been developed prosperously. The IoT connects various information sensing devices and the Internet to form a unified network system that connects many smart devices, and some smart systems based on IoT (eg, smart cities, smart medical systems) 2 have greatly improved different aspects of human life.…”
Section: Introductionmentioning
confidence: 99%
“…The authenticity of IoT is ensured through digital signature [5], and data security is met by using the encryption method [6], although the IoT has a resource hungry nature and cannot afford these two…”
Section: Introductionmentioning
confidence: 99%