2019 International Carnahan Conference on Security Technology (ICCST) 2019
DOI: 10.1109/ccst.2019.8888423
|View full text |Cite
|
Sign up to set email alerts
|

HPAKE: Hybrid Precocious Authentication and Key Establishment in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Frequent handovers require frequent authentication and security key handovers. Illegal users may imitate legitimate users with criminal intent [34], [35].…”
Section: B Serious Security Challengesmentioning
confidence: 99%
“…Frequent handovers require frequent authentication and security key handovers. Illegal users may imitate legitimate users with criminal intent [34], [35].…”
Section: B Serious Security Challengesmentioning
confidence: 99%
“…The Key Distribution cost is less compared to the schemes that use Certificates based on traditional PKI. AKA schemes with A Key Generator (KG) produces Shared Secret using Consumer ID attested by KG, and the Consumer produces Secret Code based on individual Secret [52].…”
Section: Fig 3 Key Management In Internet Of Thingsmentioning
confidence: 99%
“…D2 computes equation ( 11), equation (12), and equation ( 13) to obtain f6, f7, and f8 and Send f7, f8 to A.…”
Section: Sending Device(d1)mentioning
confidence: 99%
“…Lightweight encryption algorithms improve the security functionality, which depends on the Pre-shared Key set for non-compromised devices. The Authentication and Key management are designed to secure communications in the 6LoWPAN network interface [12]. The embedded system connections and network facilities to carry data between them lead to data protection during transmission.…”
Section: Introductionmentioning
confidence: 99%