2023
DOI: 10.1007/s10922-023-09754-z
|View full text |Cite
|
Sign up to set email alerts
|

Security Evaluation of Authentication Requirements in IoT Gateways

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Furthermore, there are several user authentication schemes in the literature for IoT environments, such as [13][14][15] and [16]. In [17], the researchers introduced a scheme to evaluate the compliance levels of authentication in existing IoT gateways. They proposed a methodology for assessing the authentication requirements of IoT gateways.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, there are several user authentication schemes in the literature for IoT environments, such as [13][14][15] and [16]. In [17], the researchers introduced a scheme to evaluate the compliance levels of authentication in existing IoT gateways. They proposed a methodology for assessing the authentication requirements of IoT gateways.…”
Section: Related Workmentioning
confidence: 99%
“…Data confidentiality needs to be guaranteed during communication. Due to the limited resources of IoT devices, traditional security mechanisms with complex computation cannot be directly applied to IoT devices (Gomes et al, 2023). Additionally, most traditional security mechanisms are one-to-one encryption, unsuitable for large-scale IoT scenarios, like the PE teaching platform in colleges.…”
Section: Introductionmentioning
confidence: 99%