2020
DOI: 10.1109/tdsc.2017.2764083
|View full text |Cite
|
Sign up to set email alerts
|

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

2
208
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 276 publications
(210 citation statements)
references
References 30 publications
2
208
0
Order By: Relevance
“…In IoT-based critical applications, only authorised users can access the IoT sensors data or query stored data on cloud servers to realise the hidden patterns of some phenomena. Wazid et al [37] discussed the authentication schemes for cloud-driven IoT-based big data environment and provided a comparative study of numerous existing authentication schemes that are shown in Table 3.…”
Section: Rq3: What Kind Of Authentication Scheme (Techniques)mentioning
confidence: 99%
“…In IoT-based critical applications, only authorised users can access the IoT sensors data or query stored data on cloud servers to realise the hidden patterns of some phenomena. Wazid et al [37] discussed the authentication schemes for cloud-driven IoT-based big data environment and provided a comparative study of numerous existing authentication schemes that are shown in Table 3.…”
Section: Rq3: What Kind Of Authentication Scheme (Techniques)mentioning
confidence: 99%
“…Fuzzy extractor is one of the biometric verification methods, and it is popularly used in biometric‐based authentication schemes …”
Section: Mathematical Preliminariesmentioning
confidence: 99%
“…The Internet of Things (IoT) is a network of physical objects (for example, smart devices) such as smart vehicles, smart industrial monitoring machines, smart home appliances, and many more. Such objects are connected together to gather, process, rectify, and exchange relevant data over the Internet [1][2][3][4][5][6]. Furthermore, smart devices along with application programming interfaces (APIs) are used to connect and exchange data over the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…As existing authentication protocols have security flaws that make them vulnerable to some known attacks (for example, "privileged insider attack", "online and offline password guessing", etc. ), consequently, it becomes important to enhance the security of the authentication protocols, for instance in the case of "new device addition or revocation", other communicating parties of the network should also be informed by the concerned (trusted) authority so that they can become aware about this activity and can update their memories accordingly [1,4]. Hence, it is an exigent task to provide a design for such a kind of protocol that supports "dynamic installation/update" without compromising the security of the system [4].…”
mentioning
confidence: 99%
See 1 more Smart Citation