2023
DOI: 10.1109/access.2023.3261666
|View full text |Cite
|
Sign up to set email alerts
|

L-ECQV: Lightweight ECQV Implicit Certificates for Authentication in the Internet of Things

Abstract: The vast expansion of the Internet of Things (IoT) devices and related applications has bridged the gap between the physical and digital world. Unfortunately, security remains a major challenge and the lack of secure links have fueled the increased attacks on IoT devices and networks. Due to its inherent scalability, Public Key Infrastructure (PKI) is the well-known and classic approach to bring public-key certificate based security to IoT. Even though the standard X.509 explicit certificates can be viable sol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 76 publications
(153 reference statements)
0
7
0
Order By: Relevance
“…Networks: Comprising 12% of the total, research papers [57][58][59][60][61][62][63][64][65] in this domain emphasize advanced protocols and encryption strategies to foster trusted connections. The primary focus is on fortifying network security to mitigate unauthorized access and potential data breaches.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
See 4 more Smart Citations
“…Networks: Comprising 12% of the total, research papers [57][58][59][60][61][62][63][64][65] in this domain emphasize advanced protocols and encryption strategies to foster trusted connections. The primary focus is on fortifying network security to mitigate unauthorized access and potential data breaches.…”
Section: Types Of Publication Channelsmentioning
confidence: 99%
“…This section will delve into the five contribution approaches for each domain, and they have been mapped in Table 7. Among the most popular problems involves addressing the issue of computational constraints associated with authentication processes in IoT, which leads to the proposal of a lightweight authentication framework [7,44,55,59,61,64,65,67,70], especially when integrating blockchain technology [80]. Another problem arose from the risk to personal data (or data privacy), which requires a secure communication protocol to protect the privacy and reliability of IoT communications [10,30,32,33,50,52,53,65,71,77].…”
Section: Rq4 What Is the Contribution Of Authentication In Iot System?mentioning
confidence: 99%
See 3 more Smart Citations