2022
DOI: 10.1016/j.sysarc.2022.102763
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
50
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 57 publications
(50 citation statements)
references
References 34 publications
0
50
0
Order By: Relevance
“…For instance, the authors in [18] have surveyed numerous cloud deployments which clearly shows that data sharing lacks protection. In addition, most of the data stored in the cloud is in unencrypted mode [7], [19]. As explained in [20], [21], [22], the data exchange in IoT-enabled cloud computing environments is through public channels.…”
Section: Figure 1 Iot-cloud Environmentmentioning
confidence: 99%
“…For instance, the authors in [18] have surveyed numerous cloud deployments which clearly shows that data sharing lacks protection. In addition, most of the data stored in the cloud is in unencrypted mode [7], [19]. As explained in [20], [21], [22], the data exchange in IoT-enabled cloud computing environments is through public channels.…”
Section: Figure 1 Iot-cloud Environmentmentioning
confidence: 99%
“…To address this challenge, authors in [66] have presented a mutual authentication scheme in which the reader is equipped with cache for storage of tag secret keys. Although this scheme incurs minimal computation costs, this cache renders the reader susceptible to side-channeling attacks [67]. As such, an improved mutual authentication technique using a Challenge Handshake Authentication Protocol (CHAP) is developed in [68].…”
Section: Related Workmentioning
confidence: 99%
“…There is need to understand big data analytics and its application in economics, strategy, social, information security [11], [12], [13], [14] , [15] [16] and professional issues in order to maximize the benefits that it brings. The usual security issues such as violation of access controls [17], alteration of clinical images, manipulative usage need to be contained [9]. These has led to application of techniques such as digital image encryption, steganography, biometrics, rule-based policy, prescriptive analysis, blockchain [18], [19], [20], [21], [22] contact tracing, cloud security, MapReduce, machine-learning algorithms, anonymizations [23] among others.…”
Section: Introductionmentioning
confidence: 99%