2020
DOI: 10.1016/j.pmcj.2020.101194
|View full text |Cite
|
Sign up to set email alerts
|

ECCbAP: A secure ECC-based authentication protocol for IoT edge devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 47 publications
(37 citation statements)
references
References 13 publications
0
26
0
Order By: Relevance
“…Scyther is a popular tool for automated verification of security protocols, which was introduced in the year 2008 [ 65 ]. It has been used in many recent security research [ 66 , 67 , 68 , 69 , 70 , 71 ]. Scyther is a Python based tool [ 65 , 67 ] which is available for Linux, Windows, and Mac OS X environments [ 64 , 65 ].…”
Section: Results and Performance Evaluationmentioning
confidence: 99%
“…Scyther is a popular tool for automated verification of security protocols, which was introduced in the year 2008 [ 65 ]. It has been used in many recent security research [ 66 , 67 , 68 , 69 , 70 , 71 ]. Scyther is a Python based tool [ 65 , 67 ] which is available for Linux, Windows, and Mac OS X environments [ 64 , 65 ].…”
Section: Results and Performance Evaluationmentioning
confidence: 99%
“…Topic 6 corresponds to research on the development of user mutual authentication protocols for social IoT, IoTbased Long-Term Evolution (LTE), LTE-advanced networks, WSNs, and NFC (near-field communication) payment systems [144,[208][209][210][211][212][213][214][215][216][217][218]. In addition, the verification of authentication protocols using software tools, such as BAN and AVISPA, has gained popularity [213,214,217,[219][220][221].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…some medical services or vehicular networks, many researchers tried to provide desired security using public key based components which could be Elliptic Curve Cryptography (ECC) for instance, e.g. [33], [34], [35], [36], [37], bilinear pairings, e.g. [38], [39], or chaotic map such as [40].…”
Section: B State Of the Artmentioning
confidence: 99%