2013 16th International Conference on Network-Based Information Systems 2013
DOI: 10.1109/nbis.2013.98
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Identity Authentication Scheme for Internet of Things in Heterogeneous Networking Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Most of the studied schemes achieved mutual authentication and none of them uses any additional hardware to perform the authentication process. Moreover, except for [30,36,37], registration/offline phases are essential phases in the authentication process. Table 4 shows the comparison between PKC based schemes according to the architecture.…”
Section: Comparison and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the studied schemes achieved mutual authentication and none of them uses any additional hardware to perform the authentication process. Moreover, except for [30,36,37], registration/offline phases are essential phases in the authentication process. Table 4 shows the comparison between PKC based schemes according to the architecture.…”
Section: Comparison and Discussionmentioning
confidence: 99%
“…In [30][31][32][33][34][35][36][37][38] Elliptic Curve Cryptography (ECC) based PKC schemes are proposed. The scheme in [30] is proposed for WSNs and the authentication is performed in two phases: the first phase is system initialization in which all Elliptic Curve (EC) parameters are selected and the private key is generated. After initialization, all public parameters are distributed to the network.…”
Section: Summary Of Pkc Authentication Schemesmentioning
confidence: 99%
“…These shortcomings can undermine the privacy and security of the system, potentially exposing devices to risks such as identity disclosure, correlation of activities, and traceable transaction history. Chu et al [ 11 ] presented a scheme leveraging a smart card and a hash function to establish secure authentication and communication between IoT devices and the network. The scheme introduces a novel key-updating mechanism that enhances system security by regularly refreshing the authentication keys.…”
Section: Related Workmentioning
confidence: 99%
“…In [ 121 ], the authors proposed an authentication scheme to be deployed in WSNs. The scheme consists of two main steps: the initialization step in which the user is given a public/private key using a lightweight ECC-based protocol.…”
Section: Analysis Of Iot Authentication Schemesmentioning
confidence: 99%