2014 International Symposium on Next-Generation Electronics (ISNE) 2014
DOI: 10.1109/isne.2014.6839375
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight authentication protocol for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 155 publications
(66 citation statements)
references
References 2 publications
0
65
0
1
Order By: Relevance
“…Since authentication is the cornerstone of providing effective security, a number of authentication schemes have been proposed to ensure security in IoT or M2M applications [12]- [16]; however, they cannot be readily applied for IIoT because manufacturing machines are naturally limited with computation power and/or communication bandwidth. In this paper, we propose a lightweight authentication scheme to authenticate these resource constrained machineries in order to ensure secure integration of IIoT solutions in the future production systems.…”
Section: Introductionmentioning
confidence: 99%
“…Since authentication is the cornerstone of providing effective security, a number of authentication schemes have been proposed to ensure security in IoT or M2M applications [12]- [16]; however, they cannot be readily applied for IIoT because manufacturing machines are naturally limited with computation power and/or communication bandwidth. In this paper, we propose a lightweight authentication scheme to authenticate these resource constrained machineries in order to ensure secure integration of IIoT solutions in the future production systems.…”
Section: Introductionmentioning
confidence: 99%
“…Although current mobile devices may support the security schemes, many IoT devices have limited power and computational resources. Therefore, a light weight encryption algorithm [94] and key management protocol are needed for IoT devices. Additionally, there are some DDoS-preventing algorithms [95], which use null routing or unauthorized packet filtering.…”
Section: Data Securitymentioning
confidence: 99%
“…Examples of uses of lightweight cryptography in IoT are authentications schemes [26][27] or device management [28][29]. Lightweight cryptography contains different sorts of algorithms that can be used, all of them are under studies, one can give as examples: Symmetric ciphers for lightweight crypto, asymmetric ciphers and homomorphism.…”
Section: Encryptionmentioning
confidence: 99%