2020
DOI: 10.3390/s20051357
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes

Abstract: Security and efficiency are the two main challenges for designing a smart home system. In this paper, by incorporating Chinese remainder theorem (CRT) into the elliptic curve Diffie–Hellman (ECDH), a lightweight key agreement protocol for smart home systems is constructed. Firstly, one-way hash authentication is used to identify the sensor nodes instead of mutual authentication to reduce the authentication cost. Secondly, the CRT is introduced to enhance the security of the original ECDH key agreement. Securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 24 publications
(36 reference statements)
0
4
0
Order By: Relevance
“…This section is aimed at highlighting the security assurances that the SeT-D2D protocol offers. Similar security analysis are also conducted in [20], [39], [40].…”
Section: E Security Analysismentioning
confidence: 99%
“…This section is aimed at highlighting the security assurances that the SeT-D2D protocol offers. Similar security analysis are also conducted in [20], [39], [40].…”
Section: E Security Analysismentioning
confidence: 99%
“…However, the authentication process raises communication costs. Subsequently, based on ECDH and CRT, Jiang et al [15] devised a lightweight key agreement protocol. To identify sensor nodes, they employed a one-way hash function, which lowers the cost of authentication.…”
Section: Related Work On Group Shared Keymentioning
confidence: 99%
“…ECC keys are commonly used techniques as the first-factor authentication due to their lightweight keys and reliable protection [24,39,45]. Adopting the hierarchical access technique with ECC is a perfect way to secure data sharing to other medical staff based on their role, which has been used for other fields like smart homes [62]. This technique requires KGS, located in the cloud layer, as shown in Fig.…”
Section: A Securing Data Collectionmentioning
confidence: 99%