2018
DOI: 10.1109/jiot.2017.2757918
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…[17] as “the sensing layer” or by Bendavid [18] as “the data capture layer”. At this level, one method to increase the security and to prohibit unauthorized access in IoT applications is to perform tag-reader mutual authentication protocol [19,20,21,22]. Various security techniques can be applied in order to transfer data securely such as cryptosystems.…”
Section: Rfid Authentication Protocols Using Pufmentioning
confidence: 99%
“…[17] as “the sensing layer” or by Bendavid [18] as “the data capture layer”. At this level, one method to increase the security and to prohibit unauthorized access in IoT applications is to perform tag-reader mutual authentication protocol [19,20,21,22]. Various security techniques can be applied in order to transfer data securely such as cryptosystems.…”
Section: Rfid Authentication Protocols Using Pufmentioning
confidence: 99%
“…Many applications provide identity, authentication, and authorization across multiple contexts for IoT scenarios [ 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 ], and different authors present many taxonomies. Shubham Agrawal et al [ 24 ] claim that there are different authentication schemes, named: OTP, Zero-Knowledge proof, Mutual Authentication, Public Key Cryptography, and Digital Signature.…”
Section: Related Workmentioning
confidence: 99%
“…This section presents some attacks that are usually issues related to IoT solutions. We want to classify the protocol security based on a set of theorems, adapting those used by Afifi et al [ 23 ] or Sousa, Patrícia R., et al [ 50 ] to prove that an authentication protocol is secure.…”
Section: Security Analysismentioning
confidence: 99%
“…Recent work of authentication Protocol design based on self-adapted powered timers has been carried by Affifi et al [43] for RFID based IoT application. In this author have presented various improved authentication protocols to mitigate the security defects in the existing protocols.…”
Section: Existing Research Approachesmentioning
confidence: 99%