2019
DOI: 10.1109/access.2019.2893918
|View full text |Cite
|
Sign up to set email alerts
|

An Unlinkable Authentication Scheme for Distributed IoT Application

Abstract: The Internet of Things (IoT) is an enormous ubiquitous-network, which connects the objects through various sensors. The IoT technology promotes the interconnection and fusion between the physical world and information space, and it facilitates the day-to-day life of people. However, since a lot of equipped sensors are unattended and open, the IoT must face and overcome the main problems of security and privacy. Authentication is one of the paramount security concerns in the IoT environment, in which a user cou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 34 publications
0
10
0
Order By: Relevance
“…In [18][19][20][21][22] authors have provided security by designing Blockchain-based distributed collocation storage architecture in WSN. They have used an asymmetric signature and trust [23][24][25][26] for providing efficient security in WSN.…”
Section: Related Workmentioning
confidence: 99%
“…In [18][19][20][21][22] authors have provided security by designing Blockchain-based distributed collocation storage architecture in WSN. They have used an asymmetric signature and trust [23][24][25][26] for providing efficient security in WSN.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the proposal of Srinivas et al [7] was also debated for lack of untraceability by Ali et al [8]. In the same year, Zhou et al [9] also proposed an access control mechanism between a user and a node in distributed IoT settings through bilinear pairing. The weaknesses of Zhou et al's scheme against responder/IoT node impersonation was argued in [10].…”
Section: Related Workmentioning
confidence: 99%
“…e scheme proposed by Ali et al could not resist ephemeral secret leakage attacks. e scheme proposed by Zhou et al [21] in a distributed IoT environment using pairing was proved as insecure to IoTdevice forgery attacks [22]. In 2019, Wazid et al [23] also proposed a new protocol for securing user-UAV communication through symmetric key primitives.…”
Section: Related Workmentioning
confidence: 99%
“…Srinivas et al [19] 2019 SKP Lacks anonymity and resistance to impersonation based on stolen verifier. Zhou et al [21] 2019 ECC and PR Insecure against IoT device forgery attack.…”
Section: Initializationmentioning
confidence: 99%