2023
DOI: 10.1109/access.2023.3243624
|View full text |Cite
|
Sign up to set email alerts
|

Perception Layer Lightweight Certificateless Authentication Scheme for IoT-Based Emergency Logistics

Abstract: Emergency logistics is of great significance for supply security in emergencies. As a crucial component of strategic material reserve and allocation, emergency logistics is characterized by high levels of safety and efficacy. The security of the IoT-based emergency logistics system cannot be overstated, considering the potential damage caused by malicious accessors. Authentication is an essential means of system security. Existing certificateless authentication protocols are mostly based on bilinear pairings, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…Höglund [7] concentrates on addressing the resource limitations of IoT devices through the creation of a lightweight certificate enrollment protocol and an X.509 digital certificate profile known as XIOT. A blockchain-based lightweight certificate authentication solution that does not rely on Certification Authorities is introduced by Garba [12] as LightCert4IoT. L-ECQV is a lightweight ECQV implicit certificate that minimizes message overhead and energy usage for IoT authentication, as presented by Malik [13].…”
Section: Overview Of Iot Authentication Mechanismsmentioning
confidence: 99%
“…Höglund [7] concentrates on addressing the resource limitations of IoT devices through the creation of a lightweight certificate enrollment protocol and an X.509 digital certificate profile known as XIOT. A blockchain-based lightweight certificate authentication solution that does not rely on Certification Authorities is introduced by Garba [12] as LightCert4IoT. L-ECQV is a lightweight ECQV implicit certificate that minimizes message overhead and energy usage for IoT authentication, as presented by Malik [13].…”
Section: Overview Of Iot Authentication Mechanismsmentioning
confidence: 99%
“…Sharma et al [ 20 ] explored device identity authentication using password-based, one-time password (OTP)-based, and certificate-based methods, analyzing the security of these three authentication approaches in the context of the Internet of Things (IoT). Yang et al [ 21 ] discussed the importance of emergency logistics for supply assurance during emergencies and proposed a lightweight certificateless authentication protocol (CL-LAP) without bilinear pairing, which effectively reduces the authentication time and cost. Dammak et al [ 22 ] proposed a token-based authentication protocol (TBLUA) that has low requirements for computing and storage resources and fast verification time.…”
Section: Related Workmentioning
confidence: 99%
“…The backend data analysis server then generates a timestamp TS s and uses the obtained elliptic curve public key of the IoT terminal device and the local elliptic curve private key of the backend data analysis server to perform elliptic curve-point multiplication to obtain the session key TK s , as shown in (20). After obtaining the session key TK s , the backend data analysis server associates it with AIDi and computes the hash function value to obtain the verification message Auth i , as shown in (21). The verification message M2 is then packaged and passed to the IoT terminal device for verification; the content of M2 is shown in (10).…”
Section: Select Eid_private_key(ai) = Random 256 Bitsmentioning
confidence: 99%
“…Current certificate less authentication techniques, which are often based on bilinear pairings, do not meet the needs of emergency logistics networks, which require easy deployment and quick authentication of numerous nodes. Yang et al [6] presented a lightweight certificate less authentication system (CL-LAP) that does not rely on bilinear pairings in this work. Elliptic curves' discrete logarithm problem is the deciding factor in their security.…”
Section: Attack Detection Modelsmentioning
confidence: 99%
“…Energy conservation within WSNs is paramount, as the network lifetimethe duration from deployment until the depletion of the first node's energy -directly impacts the effectiveness and longevity of the network [5]. Hierarchical clustering has emerged as a prominent strategy to mitigate energy consumption and prolong the operational span of WSNs [6]. This technique involves segmenting expansive sensor networks into more manageable sub-units.…”
Section: Introductionmentioning
confidence: 99%