2013
DOI: 10.1007/s12083-013-0220-8
|View full text |Cite
|
Sign up to set email alerts
|

An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…According to [9], the authentication mechanism for WSN applications can be summarized as password based remote authentication using ticket. However, most of the work has sole purpose of enabling end-user authentication in generic WSN architecture and it does not provide the extensibility for the key establishment which is greatly important for secure communication.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…According to [9], the authentication mechanism for WSN applications can be summarized as password based remote authentication using ticket. However, most of the work has sole purpose of enabling end-user authentication in generic WSN architecture and it does not provide the extensibility for the key establishment which is greatly important for secure communication.…”
Section: Related Workmentioning
confidence: 99%
“…In [10][11], the authors proposed broadcast authentication protocol for WSN. Another ticket based authentication mechanism was proposed in [9], for ubiquitous collaboration in heterogeneous computing environment, which is not applicable to the high resource constrained device due to the large memory consumption. Datagram Transport Layer Security (DTLS) is an adaptation of TLS protocol and it provides an equal communication security TLS diagram protocols [12].…”
Section: Related Workmentioning
confidence: 99%
“…[8] proposed the authentication protocol in WSNs for the distributed IoT using the master key. Further research proposed by [9] discussed the authentication protocol in WSN application using ticket. Unfortunately, most of those researchers only proposed the user authentication, and do not offer mutual authentication and key establishment between device and server, in which it is imperative for the communication security [10].…”
Section: A Related Work and Contributionsmentioning
confidence: 99%
“…Exploitation of a master key for entity authentication for pervasive computing environments would be also a feasible approach to IoT enabled WSNs [13]. According to [14], the authentication mechanisms for WSN applications can be summarized as password based, remote user authentication using one-way hash functions and ticket based authentication. However, most of the work has the sole purpose of enabling end-user authentication in generic WSN architecture and it does not provide the extensibility for the key establishment.…”
Section: Related Workmentioning
confidence: 99%
“…In [15, 16], the authors have proposed broadcast authentication schemes for WSNs. Reference [14] presents an effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment. This is a ticket based user authentication scheme, which is not applicable to the high resource constrained devices due to large memory consumption.…”
Section: Related Workmentioning
confidence: 99%