2015
DOI: 10.1016/j.pmcj.2015.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Secure authentication scheme for IoT and cloud servers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
176
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 253 publications
(176 citation statements)
references
References 26 publications
0
176
0
Order By: Relevance
“…In this work, authors claimed that unlike existing attribute-based encryption and signature schemes, their scheme requires only a little amount of elliptic curve bilinear pairings and modular exponentiations. In 2015, Kalra and Sood [53] reported an authentication scheme to connect resource-constrained devices (tiny devices) to the cloud server using Elliptic Curve Cryptography (ECC) for Internet of Things (IoT). However, in 2017, S. Kumari et al [48] have shown that Kalra and Sood's scheme [53] is vulnerable to offline password guessing and privileged insider attacks and does not achieve device anonymity, session key agreement and mutual authentication.…”
Section: Issues In Recent Single Server Akap For Cloud Platformmentioning
confidence: 99%
See 2 more Smart Citations
“…In this work, authors claimed that unlike existing attribute-based encryption and signature schemes, their scheme requires only a little amount of elliptic curve bilinear pairings and modular exponentiations. In 2015, Kalra and Sood [53] reported an authentication scheme to connect resource-constrained devices (tiny devices) to the cloud server using Elliptic Curve Cryptography (ECC) for Internet of Things (IoT). However, in 2017, S. Kumari et al [48] have shown that Kalra and Sood's scheme [53] is vulnerable to offline password guessing and privileged insider attacks and does not achieve device anonymity, session key agreement and mutual authentication.…”
Section: Issues In Recent Single Server Akap For Cloud Platformmentioning
confidence: 99%
“…This leads to opening up a security problem as the communication takes place over insecure channel for accessing services. Towards this solution, a number of single server-based authentication and key agreement protocols are reported in the recent literature [48]- [51], [53]- [59].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, a secure ECC based mutual authentication protocol for secure communication of embedded devices and cloud servers using Hyper Text Transfer Protocol (HTTP) cookies has been proposed [25]. Similar research work in this domain are performed in [25] …”
Section: Introductionmentioning
confidence: 96%
“…This article presents five IoT technologies that are essential in the deployment of successful IoT-based products and services and discusses three IoT categories for enterprise applications used to enhance customer value [24]. In this paper, a secure ECC based mutual authentication protocol for secure communication of embedded devices and cloud servers using Hyper Text Transfer Protocol (HTTP) cookies has been proposed [25]. Similar research work in this domain are performed in [25] …”
Section: Introductionmentioning
confidence: 99%