2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN) 2019
DOI: 10.1109/iccsn.2019.8905268
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Mutual Authentication Scheme Based on ECDH for IoT Devices Using ESP8266

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…We can see from In Baghbanijam and Sanaei [3], the key exchange phase requires encryption and therefore the execution time cost will be very large compared to our proposed protocol. Phimphinith et al [23] and Wu et al [30] did not specify execution time costs and thus it is difficult to make a comparison with our protocol. Rangwani et al [26] and Gope and Sikdar [28] used many parameters such as using more than six hashes, which makes key exchange complicated to calculate.…”
Section: Computational Costmentioning
confidence: 96%
See 2 more Smart Citations
“…We can see from In Baghbanijam and Sanaei [3], the key exchange phase requires encryption and therefore the execution time cost will be very large compared to our proposed protocol. Phimphinith et al [23] and Wu et al [30] did not specify execution time costs and thus it is difficult to make a comparison with our protocol. Rangwani et al [26] and Gope and Sikdar [28] used many parameters such as using more than six hashes, which makes key exchange complicated to calculate.…”
Section: Computational Costmentioning
confidence: 96%
“…Phimphinith et al [23] proposed an ECDH-key agreement based on cureve25519 in IoT applications for communications between ESP866. They indicated that their scheme resists man in the middle (MITM) attacks, replay and modification.…”
Section: Keys Exchange Studies Of Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Apart from AODV protocol, Adil et al also used elliptic curve deffi-hellman problem (ECDDHP) and elliptic curve integrated encryption scheme (ECIES) to encrypt the data packet (Adil et al, 2020). According to Phimphinith et al, the ECDDHP can ensure that the attackers cannot reach from one point to another point given two points because they do not have ability to compute the multiplicand (Phimphinith et al, 2019). By applying this concept in Adil et al's scheme, it is securing the network from the impersonation attack.…”
Section: Related Workmentioning
confidence: 99%
“…The result of the difference in key sizes leads to the low capabilities devices performing more effective computing [26,27]. The base of hardness in ECC is the discrete logarithm structure of elliptic curves over finite fields [28,29], where the ECC is used to exchange keys, and to encrypt transmitted message between two parties [30][31][32]. Additionally, ECC is used to ensure the integrity of transmitted messages and non-repudiation using elliptic curve digital signature algorithms (ECDSA) [33,34].…”
Section: Preliminary: Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%