2022 Sixth International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac) 2022
DOI: 10.1109/i-smac55078.2022.9987278
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Cryptography solutions for Industrial IoT - A Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…However, such a scheme is susceptible to spoofing or impersonation in complex IoT environments (e.g., smart health, smart home, smart cities). To protect IoT information between any two IoT entities and / or with thirdparty service providers, it is required to use two-way authentication [189] or three-way authentication [190]. d) Authentication methodology: To efficiently manage the identity of the accessing devices, IIoT networks tend to stipulate their architecture in terms of centralization, distribution, or decentralization.…”
Section: B Confidentialitymentioning
confidence: 99%
“…However, such a scheme is susceptible to spoofing or impersonation in complex IoT environments (e.g., smart health, smart home, smart cities). To protect IoT information between any two IoT entities and / or with thirdparty service providers, it is required to use two-way authentication [189] or three-way authentication [190]. d) Authentication methodology: To efficiently manage the identity of the accessing devices, IIoT networks tend to stipulate their architecture in terms of centralization, distribution, or decentralization.…”
Section: B Confidentialitymentioning
confidence: 99%