2019 6th International Conference on Signal Processing and Integrated Networks (SPIN) 2019
DOI: 10.1109/spin.2019.8711757
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Authentication Scheme for Cloud-Centric IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 13 publications
0
6
0
2
Order By: Relevance
“…This taxonomy process produces the following eight categories, are shown in Figure 3 with their included number of publications: Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , ...…”
Section: Taxonomy and Trendsmentioning
confidence: 99%
See 3 more Smart Citations
“…This taxonomy process produces the following eight categories, are shown in Figure 3 with their included number of publications: Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , ...…”
Section: Taxonomy and Trendsmentioning
confidence: 99%
“…Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 , 73 ,...…”
Section: Taxonomy and Trendsunclassified
See 2 more Smart Citations
“…In such a scheme, the user employs a smart card and/or a password to authenticate itself to a service. Some schemes (e.g., smart home gateway) employ a separate, centralized authentication gateway to authenticate the associated IoT devices [4], [11]- [13]. The user communicates with the IoT devices through the centralized gateway.…”
Section: Introductionmentioning
confidence: 99%