2023
DOI: 10.1016/j.iot.2023.100703
|View full text |Cite
|
Sign up to set email alerts
|

Robust and lightweight symmetric key exchange algorithm for next-generation IoE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…This established SK is used for encrypted communication by both the user and the drones. In [14], an effective and reliable ASKG is developed for use in the setting of smart devices with constrained computational processing capability. The goal of ASKG is to create a secure communication channel.…”
Section: Related Workmentioning
confidence: 99%
“…This established SK is used for encrypted communication by both the user and the drones. In [14], an effective and reliable ASKG is developed for use in the setting of smart devices with constrained computational processing capability. The goal of ASKG is to create a secure communication channel.…”
Section: Related Workmentioning
confidence: 99%
“…In [28], Challa et al proposed an ECC-based user authentication that is heavy with respect to computation and communication [29,30]. Moreover, Jia et al [31] found that the scheme [28] does not provide security against impersonate attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Both DH and EC-DH are symmetric key exchange algorithms and are non-authenticated. Hence, DH and EC-DH are exposed to MITM attacks [24].…”
Section: Related Workmentioning
confidence: 99%
“…It limits the size of the key to 128 bits. The larger size of the key minimizes the threats of brute-force attacks [24].…”
Section: Session Key Exchange Phasementioning
confidence: 99%