2019
DOI: 10.1109/jiot.2018.2846299
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices

Abstract: This is a repository copy of Lightweight and privacy-preserving two-factor authentication scheme for IoT devices.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
171
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 296 publications
(192 citation statements)
references
References 21 publications
0
171
0
2
Order By: Relevance
“…IoT devices are responsible for acquiring, storing, and transferring data. Currently, many IoT devices are located on the edge of a network and lack of protection measures to resist various attacks [38][39][40][41][42][43]. Therefore, these devices are more vulnerable to some attacks, such as device theft, device manipulation, identity theft, data eavesdropping and so on.…”
Section: Discussionmentioning
confidence: 99%
“…IoT devices are responsible for acquiring, storing, and transferring data. Currently, many IoT devices are located on the edge of a network and lack of protection measures to resist various attacks [38][39][40][41][42][43]. Therefore, these devices are more vulnerable to some attacks, such as device theft, device manipulation, identity theft, data eavesdropping and so on.…”
Section: Discussionmentioning
confidence: 99%
“…Gope and Sikdar [21] have not only emphasized on vulnerability of IoT devices at public places but also realized a need of robust IoT device authentication strategy. The authors proposed an authentication model using PUF to make IoT devices invulnerable to physical and cloning attacks.…”
Section: ) Asymmetric Key Based Schemesmentioning
confidence: 99%
“…Both the input parameters and the return result are a string of bits and constitute a challenge-response pair (CRP). Some protocols [7]- [9] with PUF need to store a set of CRPs for each sensor node, which increases the storage space complexity of GateWay [10]. CRPs stored in GateWay for authentication are finite and consumed in every authentication phase, and thus CRPs will eventually get exhausted.…”
Section: A Motivationsmentioning
confidence: 99%