2021 International Conference on Advanced Computing and Endogenous Security 2022
DOI: 10.1109/ieeeconf52377.2022.10013341
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Authentication and Key Agreement Protocol for IoT Based on ECC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…We compared our protocol with other existing key establishment schemes that also provide authentication properties in Table 3. In [14], the key establishment required two parties to update information for consecutive communication. Excluding the registration phase, the protocol needed four exchange messages, with a total of 168 bytes.…”
Section: Communication Overheadmentioning
confidence: 99%
See 3 more Smart Citations
“…We compared our protocol with other existing key establishment schemes that also provide authentication properties in Table 3. In [14], the key establishment required two parties to update information for consecutive communication. Excluding the registration phase, the protocol needed four exchange messages, with a total of 168 bytes.…”
Section: Communication Overheadmentioning
confidence: 99%
“…Different approaches can be used to evaluate the computation overhead of a communication protocol. Some studies, like [14,30], tested the cost of elliptic curve operations and hash functions on desktop processors and then deducted the overall timing cost from their proposed protocols. On the other hand, the studies in [28,29] calculated the overall timing cost by adopting the timing of those operations and functions from other works.…”
Section: Computation Overheadmentioning
confidence: 99%
See 2 more Smart Citations