2019
DOI: 10.1016/j.jisa.2019.02.005
|View full text |Cite
|
Sign up to set email alerts
|

ECC based inter-device authentication and authorization scheme using MQTT for IoT networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(51 citation statements)
references
References 20 publications
0
51
0
Order By: Relevance
“…In Lohachab, 28 the focus is on SD registration and authentication mechanism with user authentication using symmetric and asymmetric key cryptography. This mechanism is based on Message Queuing Telemetry tTansport (MQTT) protocol and suffers from computation, communication, and storage overheads.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In Lohachab, 28 the focus is on SD registration and authentication mechanism with user authentication using symmetric and asymmetric key cryptography. This mechanism is based on Message Queuing Telemetry tTansport (MQTT) protocol and suffers from computation, communication, and storage overheads.…”
Section: Related Workmentioning
confidence: 99%
“…In Kim and Heo, 16 the protocol does not ensure security against masquerade, replay, DoS, secret value guessing, and node compromised attack. In Kumar et al and Lohachab, 20,28 the mechanisms are vulnerable to Sybil, secret value guessing, and node compromised attack. It does not ensure forward and backward secrecy.…”
Section: Comparative Studymentioning
confidence: 99%
See 1 more Smart Citation
“…In [39], the authors present above all a method of authorization using Elliptical Curve Cryptography (ECC). However, they also implement an authorization scheme using capabilities.…”
Section: Related Workmentioning
confidence: 99%
“…An anomaly was created because the microservices behave differently at various times that leads to deviations in normal behavior. A. Lohachab, [16] tackled the vulnerabilities associated with security challenges by presenting a light-weight authorization and authentication framework using MQTT and Elliptical Curve Cryptography (ECC). Authorization of devices were approved by using the Usage Control (UCON) based access control, whereas the access control policies were defined for users by developing a Capability Based Access Control (Cap-BAC) model.…”
Section: Literature Reviewmentioning
confidence: 99%