2016
DOI: 10.1016/j.procs.2016.06.006
|View full text |Cite
|
Sign up to set email alerts
|

Terminal Authentication in M2M Communications in the Context of Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…In [30][31][32][33][34][35][36][37][38] Elliptic Curve Cryptography (ECC) based PKC schemes are proposed. The scheme in [30] is proposed for WSNs and the authentication is performed in two phases: the first phase is system initialization in which all Elliptic Curve (EC) parameters are selected and the private key is generated.…”
Section: Summary Of Pkc Authentication Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…In [30][31][32][33][34][35][36][37][38] Elliptic Curve Cryptography (ECC) based PKC schemes are proposed. The scheme in [30] is proposed for WSNs and the authentication is performed in two phases: the first phase is system initialization in which all Elliptic Curve (EC) parameters are selected and the private key is generated.…”
Section: Summary Of Pkc Authentication Schemesmentioning
confidence: 99%
“…The method in [33] is based on blind signature. There are three entities; devices, gateway and storage server.…”
Section: Iotmentioning
confidence: 99%
“…A blind signature is observed as a method of authentication for the IoT networks in [22]. The authentication scheme includes an additional storage server that contains signatures.…”
Section: Related Workmentioning
confidence: 99%
“…The technology that support integration between machines is called machine-to-machine communication (M2M). M2M and IoT are concepts intrinsically joined, resulted from technological advances of cheap semiconductors chips and large Internet accessibility (Ranjan and Hussain, 2016). A typical definition of M2M is the communication between two machines or data transfer from a device to a central computer.…”
Section: M2m In Manufacturementioning
confidence: 99%