2018 International Conference on Applied and Engineering Mathematics (ICAEM) 2018
DOI: 10.1109/icaem.2018.8536261
|View full text |Cite
|
Sign up to set email alerts
|

Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 59 publications
(38 citation statements)
references
References 10 publications
0
36
0
2
Order By: Relevance
“…If Public key is compromised, the retrieval of Private key is not computationally possible. [7] Implementation of PKI in IoT and Smart homes can be more feasible. Devices can encrypt data using a unique public key incorporated with a private key, which is used to decrypt the data at user's end.…”
Section: A Internet Of Thingmentioning
confidence: 99%
See 3 more Smart Citations
“…If Public key is compromised, the retrieval of Private key is not computationally possible. [7] Implementation of PKI in IoT and Smart homes can be more feasible. Devices can encrypt data using a unique public key incorporated with a private key, which is used to decrypt the data at user's end.…”
Section: A Internet Of Thingmentioning
confidence: 99%
“…The communication between IoT device and the cloud need to be secure. [7] A general PKI Digital Certification is third party entity that issues certificate after legitimate authentication. These authorities are known as CA (Certification Authority) which generate, issues and sign a digital certificate.…”
Section: A Internet Of Thingmentioning
confidence: 99%
See 2 more Smart Citations
“…Alizai, Z. A, et.al (2018) proposed using multi-factor authentication for an IOT device through an idea of efficient device authentication scheme presented in this paper [13]. The combination of different authentication mechanisms and the addition of certain features in the scheme can actually mitigate various vulnerabilities which can be exploited through the adversary as described in this paper.…”
Section: Introductionmentioning
confidence: 98%