2022
DOI: 10.1002/spy2.226
|View full text |Cite
|
Sign up to set email alerts
|

Construction of elliptic curve cryptography‐based authentication protocol for internet of things

Abstract: The advancement in the internet of things (IoT) is bringing changes in our daily lives. The widespread adoption of the IoT in a variety of areas sets the basis for smart living while also posing privacy and security concerns. Authentication and key agreement (AKA) protocol provides identity authentication for participants in a communication system and generates a temporary session key for participants to securely transmit messages. In addition to this, the adoption of smart cards adds a second line of defense … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…For computation and communication analysis, the implementation time for hash to point operation T HTP , exponential operation in multiplicative cyclic group T EXP is taken as 0.000182 s and 0.00383 s. 29 Amin et al and Chandrakar 32,33 used a 160-bit prime field F q , a 1024-bit group which is cyclic, SHA-1 Hash function, and an AES encoding algorithm. The operational computation time for one way hash functions T H in our paper is considered to be 0.00053 s. 34 Our proposed scheme comprises the cost of concatenation (∥) operation and evaluation of XOR (⊕) is not significant. Table 2, clearly shows the computational cost 18T H of Wu et al 24 scheme.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…For computation and communication analysis, the implementation time for hash to point operation T HTP , exponential operation in multiplicative cyclic group T EXP is taken as 0.000182 s and 0.00383 s. 29 Amin et al and Chandrakar 32,33 used a 160-bit prime field F q , a 1024-bit group which is cyclic, SHA-1 Hash function, and an AES encoding algorithm. The operational computation time for one way hash functions T H in our paper is considered to be 0.00053 s. 34 Our proposed scheme comprises the cost of concatenation (∥) operation and evaluation of XOR (⊕) is not significant. Table 2, clearly shows the computational cost 18T H of Wu et al 24 scheme.…”
Section: Performance Analysismentioning
confidence: 99%
“…Amin et al and Chandrakar 32,33 used a 160‐bit prime field Fq$$ {\mathrm{F}}_{\mathrm{q}} $$, a 1024‐bit group which is cyclic, SHA‐1 Hash function, and an AES encoding algorithm. The operational computation time for one way hash functions TH$$ {\mathrm{T}}_{\mathrm{H}} $$ in our paper is considered to be 0.00053 s 34 . Our proposed scheme comprises the cost of concatenation ($$ \parallel $$) operation and evaluation of XOR ($$ \oplus $$) is not significant.…”
Section: Performance Analysismentioning
confidence: 99%