2017
DOI: 10.1007/978-3-319-65978-7_73
|View full text |Cite
|
Sign up to set email alerts
|

Practical Secure Certificateless Cryptographic Protocol with Batch Verification for Intelligent Robot Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…Reference [42] proposed a lightweight authentication protocol, using hash functions and continuous XOR functions to achieve perfect forward security, which can effectively resist internal privilege, stolen verification, and sensor node capture attacks. Reference [43] proposed a certificateless authentication protocol for IoT intelligent robots and introduced a batch verification algorithm to improve the authentication efficiency of the system. The above researches inspire lightweight identity authentication for the perception layer of the IoT-based emergency logistics network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Reference [42] proposed a lightweight authentication protocol, using hash functions and continuous XOR functions to achieve perfect forward security, which can effectively resist internal privilege, stolen verification, and sensor node capture attacks. Reference [43] proposed a certificateless authentication protocol for IoT intelligent robots and introduced a batch verification algorithm to improve the authentication efficiency of the system. The above researches inspire lightweight identity authentication for the perception layer of the IoT-based emergency logistics network.…”
Section: Related Workmentioning
confidence: 99%
“…This certificateless digital signature scheme does not utilize bilinear pairings and reduces the high computation cost. We compare the computation cost of the proposed CL-LAP with the performance of the latest lightweight certificateless authentication protocols [31,[44][45][46]. The computation cost is separated into three categories for comparative purposes, signature generation cost, single message authentication cost, and batch message authentication cost.…”
Section: A Computation Costmentioning
confidence: 99%
“…It uses a two-wheel differential drive platform to perform feature matching by inputting a known environmental map to obtain environmental information [4]. Nong is also able to recognize sound signals in indoor environments and complete the transport of small objects [5]. Wei et al designed the campus security robot car in combination with the campus security issues that are often concerned by the society.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Due to the characteristics and limitations of IoT, the traditional authentication protocol for the internet is not suitable for the IoT environment. There are PKI based authentication system [14,15], certificate-based authentication system [16] and certificateless based authentication protocols [17] for IoT. Still, most of them have various problems, such as energy consumption, computing complexity, security, and centralization.…”
Section: Introductionmentioning
confidence: 99%