2015 1st International Conference on Next Generation Computing Technologies (NGCT) 2015
DOI: 10.1109/ngct.2015.7375123
|View full text |Cite
|
Sign up to set email alerts
|

3-level secure Kerberos authentication for Smart Home Systems using IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Furthermore, a three-level Kerberos authentication approach was proposed by G a i k w a d, G a b h a n e and G o l a i t [73] was implementing effective and efficient user authentication in smart home systems. This Kerberos-based authentication approach was propounded with the merits of low cost and ecofriendlyness.…”
Section: Authentication Schemes For Smart Home Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, a three-level Kerberos authentication approach was proposed by G a i k w a d, G a b h a n e and G o l a i t [73] was implementing effective and efficient user authentication in smart home systems. This Kerberos-based authentication approach was propounded with the merits of low cost and ecofriendlyness.…”
Section: Authentication Schemes For Smart Home Applicationsmentioning
confidence: 99%
“…In order to evaluate the effectiveness of the proposed authentication algorithms, the following evaluation parameters [72][73][74][75][76][77][78][79][80][81] defined below can be used.…”
Section: Authentication Schemes For Smart Home Applicationsmentioning
confidence: 99%
“…As far as user remote authentication for smart home environments is concerned, our liter-ature survey has revealed that techniques based on passwords [18] are typically weak and are not considered very secure. To improve this weakness, other techniques have been proposed such as those relying on the user's personal memory (or digital memory) [19], those relying on the use of Kerberos authentication to implement a single-sign-on [20], those relying on mobile OTP or OAuth [21], an open standard authentication and authorization protocol, in which the user receives a password that should be used within short time period after its generation, otherwise the OTP expires; those relying on smart cards [22], those relying on biometrics [23], those involving transactions based on Near Field Communications (NFC) [24], and those relying on RSA [9], [10], to name a few. The novel RSA-ASH-SC scheme proposed in this thesis belongs to this later class of protocols since its design relies on the use of a variant of RSA (so-called Om and Kumari scheme [10]), in which the anonymity of the user/device is achieved by using a one-time-token.…”
Section: Types Of Authentication Schemes For Smart Home Environmentsmentioning
confidence: 99%
“…password-based methods [7], digital memory-based methods [8], single-sign-on techniques based on the Kerberos protocol [9], smart cards-based approaches [10], biometrics-based approaches [11], techniques based on Near Field Communications (NFC) [12], RSA-based techniques [13], to name a few. The RSA-B-ASH-S authentication scheme proposed in this thesis falls to this latter category of protocols since it is an RSA-based three-factor remote user authentication scheme for smart homes using smartphones (i.e.…”
Section: Authentication Schemes For Smart Home Environmentsmentioning
confidence: 99%