2022 International Conference on Computer Science and Software Engineering (CSASE) 2022
DOI: 10.1109/csase51777.2022.9759798
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Authentication Methods in IoT: Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…The server and tag runtime times are both 0.00002949s and 0.0006569s. Table 2 shows the median GF(2m) runtime in micro secs as measured by LiDIA [6]. If "T" denotes the computed multiplication for the runtime using tags, therefore "T/5," shown in Table 3, represents a predicted running time for squares operations, i.e., 10.5 and 2.3, which is about multiplying by one-fifth.…”
Section: Computational Costmentioning
confidence: 99%
See 3 more Smart Citations
“…The server and tag runtime times are both 0.00002949s and 0.0006569s. Table 2 shows the median GF(2m) runtime in micro secs as measured by LiDIA [6]. If "T" denotes the computed multiplication for the runtime using tags, therefore "T/5," shown in Table 3, represents a predicted running time for squares operations, i.e., 10.5 and 2.3, which is about multiplying by one-fifth.…”
Section: Computational Costmentioning
confidence: 99%
“…The internet of things (IoT) is a cutting-edge wireless technology model that connects various physical devices to the internet, allowing data to be collected and distributed without human interaction. In addition, to identifying these linked devices, identification approaches like RFID, QR codes, and other sensor technology can be utilized [5,6]. IoT applications include industrial control, intelligent supply chains, intelligent retail, intelligent buildings, intelligent grids, intelligent cities, medical information networks, and telehealth [7,8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…They also provided a new classification of authentication approaches in WMSNs as a function of its architecture. Ahmed et Mohammed [27] also synthesized identity control, lightweight authentication, and authorization research in IoT networks. As a result, they emphasized topical IoT security tendencies and their achievement.…”
Section: Introductionmentioning
confidence: 99%