2022
DOI: 10.3390/s22197632
|View full text |Cite
|
Sign up to set email alerts
|

Autonomous Mutual Authentication Protocol in the Edge Networks

Abstract: A distinct security protocol is necessary for the exponential growth in intelligent edge devices. In particular, the autonomous devices need to address significant security concern to function smoothly in the high market demand. Nevertheless, exponential increase in the connected devices has made cloud networks more complex and suffer from information processing delay. Therefore, the goal of this work is to design a novel server-less mutual authentication protocol for the edge networks. The aim is to demonstra… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 49 publications
0
3
0
Order By: Relevance
“…Many researchers are focusing their work on solving security challenges in IoT networks. These challenges include interoperability, data privacy, access control, and lightweight protocol which aims to provide a solution for resource-constrained devices by reducing the key size, cycle rate, throughput rate, power consumption, and area [6]- [8]. They are also trying to improve the traditional cryptography schemes or to develop a new security protocol to protect data transmission between the cloud platform and users [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…Many researchers are focusing their work on solving security challenges in IoT networks. These challenges include interoperability, data privacy, access control, and lightweight protocol which aims to provide a solution for resource-constrained devices by reducing the key size, cycle rate, throughput rate, power consumption, and area [6]- [8]. They are also trying to improve the traditional cryptography schemes or to develop a new security protocol to protect data transmission between the cloud platform and users [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…However, the authors observed that the experiments are carried out based on their comprehension, therefore, cannot be considered perfect. Sheu et al, (2022) presents a server-less mutual authentication scheme for edge networks, the work solves security issues in autonomous devices and applications. The protocol utilizes public-key algorithm, challenge-response mechanism, identifier, time-stamps, and session keys.…”
mentioning
confidence: 99%
“…The article "Autonomous Mutual Authentication Protocol in Edge Networks" [6] addresses the challenge of designing a mutual authentication protocol for the large number of autonomous devices in edge networks. To overcome this, the authors propose a novel decentralized protocol based on a public key system, octet-based balanced-tree transitions, challenge-response mechanism, device unique ID, pseudo-random number generator, time stamps, and event-specific session keys.…”
mentioning
confidence: 99%