2019
DOI: 10.1016/j.jisa.2019.02.003
|View full text |Cite
|
Sign up to set email alerts
|

Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(36 citation statements)
references
References 15 publications
0
36
0
Order By: Relevance
“…The total energy required for communication by RLMA is 0.562 mJ as shown in Table 5 and it can also be noticed that the proposed scheme incurred less communication energy than the other schemes. Finally, from Fig.11, it is easy to visualize that a practical authentication and key establishment in the proposed scheme requires 2 message exchanges, whereas the schemes proposed in [14], [16] require 4 message exchanges and the scheme proposed in [13], [15], [17] needs 6, 3, and 7 message exchanges respectively. It should be noted that in real-world applications the actual number of message exchanges may vary if the packet transmission required multi-hop communications.…”
Section: ) Communication Costmentioning
confidence: 99%
See 2 more Smart Citations
“…The total energy required for communication by RLMA is 0.562 mJ as shown in Table 5 and it can also be noticed that the proposed scheme incurred less communication energy than the other schemes. Finally, from Fig.11, it is easy to visualize that a practical authentication and key establishment in the proposed scheme requires 2 message exchanges, whereas the schemes proposed in [14], [16] require 4 message exchanges and the scheme proposed in [13], [15], [17] needs 6, 3, and 7 message exchanges respectively. It should be noted that in real-world applications the actual number of message exchanges may vary if the packet transmission required multi-hop communications.…”
Section: ) Communication Costmentioning
confidence: 99%
“…In [16], the authors proposed an authentication model for IoT enabled smart home. The authors claimed that their scheme is lightweight and secured against vulnerabilities.…”
Section: ) Asymmetric Key Based Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Automated validation of internet security protocol and applications (AVISPA) is a formal tool for checking the security claims of cryptographic algorithms [18]. It contains a graphical user interface (GUI) of the security protocol animator (SPAN) [19].…”
Section: Basics Of Avispamentioning
confidence: 99%
“…It protects frequent transmissions between IoT devices in short session time intervals in which the secret is agreed upon between the devices during the initial authentication phase and secret actions are utilized as authentication tokens. On the other hand, a secure lightweight authentication and key exchange protocol for IoT devices in a smart home scenario was outlined in [23]. The proposed protocol provides mutual authentication between the IoT devices using a cumulative keyed-hash chain scheme, where security features are demonstrated in a smart home environment with different types of IoT sensors (mainly coffeemaker, bed, air conditioner, camera, and door sensors).…”
Section: Related Workmentioning
confidence: 99%